Bug 2447144 (CVE-2026-1525) - CVE-2026-1525 undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers
Summary: CVE-2026-1525 undici: Undici: HTTP Request Smuggling and Denial of Service du...
Keywords:
Status: NEW
Alias: CVE-2026-1525
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2447167 2447168 2447170 2447174
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-12 21:01 UTC by OSIDB Bzimport
Modified: 2026-03-12 22:05 UTC (History)
54 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-03-12 21:01:56 UTC
Undici allows duplicate HTTP Content-Length headers when they are provided in an array with case-variant names (e.g., Content-Length and content-length). This produces malformed HTTP/1.1 requests with multiple conflicting Content-Length values on the wire.

Who is impacted:

  *  Applications using undici.request(), undici.Client, or similar low-level APIs with headers passed as flat arrays
  *  Applications that accept user-controlled header names without case-normalization


Potential consequences:

  *  Denial of Service: Strict HTTP parsers (proxies, servers) will reject requests with duplicate Content-Length headers (400 Bad Request)
  *  HTTP Request Smuggling: In deployments where an intermediary and backend interpret duplicate headers inconsistently (e.g., one uses the first value, the other uses the last), this can enable request smuggling attacks leading to ACL bypass, cache poisoning, or credential hijacking


Note You need to log in before you can comment on or make changes to this bug.