High severityNVD Advisory· Published Mar 27, 2026· Updated Mar 31, 2026
Netty: HTTP Request Smuggling via Chunked Extension Quoted-String Parsing
CVE-2026-33870
Description
Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.132.Final and 4.2.10.Final, Netty incorrectly parses quoted strings in HTTP/1.1 chunked transfer encoding extension values, enabling request smuggling attacks. Versions 4.1.132.Final and 4.2.10.Final fix the issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
io.netty:netty-codec-httpMaven | < 4.1.132.Final | 4.1.132.Final |
io.netty:netty-codec-httpMaven | >= 4.2.0.Alpha1, < 4.2.10.Final | 4.2.10.Final |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-pwqr-wmgm-9rr8ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-33870ghsaADVISORY
- github.com/netty/netty/security/advisories/GHSA-pwqr-wmgm-9rr8ghsax_refsource_CONFIRMWEB
- w4ke.info/2025/06/18/funky-chunks.htmlghsax_refsource_MISCWEB
- w4ke.info/2025/10/29/funky-chunks-2.htmlghsax_refsource_MISCWEB
- www.rfc-editor.org/rfc/rfc9110ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.