CVE-2026-33555

medium

Description

An issue was discovered in HAProxy before 3.3.6. The HTTP/3 parser does not check that the received body length matches a previously announced content-length when the stream is closed via a frame with an empty payload. This can cause desynchronization issues with the backend server and could be used for request smuggling. The earliest affected version is 2.6.

References

https://www.mail-archive.com/[email protected]/msg46752.html

https://www.haproxy.org

https://www.haproxy.com/documentation/haproxy-aloha/changelog/

https://github.com/haproxy/haproxy/commit/05a295441c621089ffa4318daf0dbca2dd756a84

Details

Source: Mitre, NVD

Published: 2026-04-13

Updated: 2026-04-13

Risk Information

CVSS v2

Base Score: 2.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N

Severity: Low

CVSS v3

Base Score: 4

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N

Severity: Medium

EPSS

EPSS: 0.00009