Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests
HomeTechnologyCybersecurityNewsFixing Request Smuggling Vulnerabilities in Pingora OSS Deployments
Fixing Request Smuggling Vulnerabilities in Pingora OSS Deployments
Cybersecurity

Fixing Request Smuggling Vulnerabilities in Pingora OSS Deployments

•March 9, 2026
Cloudflare Blog
Cloudflare Blog•Mar 9, 2026

Why It Matters

The patches protect internet‑facing services that rely on Pingora from severe smuggling attacks that could lead to credential theft and cache poisoning, and they reinforce the framework’s security posture as critical infrastructure. Upgrading now mitigates risk for all external deployments.

Key Takeaways

  • •Pingora 0.8.0 patches three CVE‑2026 request smuggling bugs
  • •Vulnerabilities affect only external Pingora deployments, not Cloudflare CDN
  • •Exploits could bypass ACLs, hijack sessions, poison caches
  • •Fixes enforce strict RFC‑compliant request framing and header parsing
  • •Default cache key now excludes unsafe path‑only construction

Pulse Analysis

The rise of open‑source edge proxies has given developers powerful tools to route traffic, but it also expands the attack surface for classic HTTP request‑smuggling techniques. Request smuggling exploits inconsistencies in how a proxy and its backend interpret message boundaries, allowing malicious actors to slip additional requests past security controls. Pingora, Cloudflare’s high‑performance proxy library, has been adopted by many organizations to build custom ingress solutions, making its robustness critical for the broader internet ecosystem. Understanding the recent vulnerabilities and the remedial steps taken is essential for any team that relies on Pingora in production.

The disclosed flaws—CVE‑2026‑2833, CVE‑2026‑2835, and CVE‑2026‑2836—originated from lenient handling of HTTP/1.x upgrade headers, ambiguous Content‑Length versus Transfer‑Encoding combinations, and an overly simplistic default cache‑key algorithm. In practice, an attacker could craft a request that caused Pingora to forward a second, hidden request to the backend, bypassing ACLs, hijacking sessions, or contaminating shared caches. Pingora 0.8.0 addresses these issues by enforcing strict RFC 9110/9112 compliance: upgrade streams are only accepted after a 101 response, request bodies are never close‑delimited, and malformed Transfer‑Encoding headers are rejected. The cache‑key logic now requires explicit construction, eliminating path‑only collisions.

For operators running Pingora outside Cloudflare’s protected network, the immediate recommendation is to upgrade to version 0.8.0 and review custom cache‑key configurations. The fixes not only close the identified attack vectors but also set a higher baseline for future development, encouraging developers to prioritize protocol correctness over backward compatibility shortcuts. As more services expose Pingora to the public internet, maintaining rigorous RFC adherence will be a decisive factor in preventing similar vulnerabilities. Continuous monitoring, regular dependency updates, and participation in the Pingora community’s security disclosures will help keep deployments resilient against evolving smuggling tactics.

Fixing request smuggling vulnerabilities in Pingora OSS deployments

Read Original Article

Comments

Want to join the conversation?

Loading comments...

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Tuesday recap

Top Publishers

  • The Verge AI

    The Verge AI

    21 followers

  • TechCrunch AI

    TechCrunch AI

    19 followers

  • Crunchbase News AI

    Crunchbase News AI

    15 followers

  • TechRadar

    TechRadar

    15 followers

  • Hacker News

    Hacker News

    13 followers

See More →

Top Creators

  • Ryan Allis

    Ryan Allis

    194 followers

  • Elon Musk

    Elon Musk

    78 followers

  • Sam Altman

    Sam Altman

    68 followers

  • Mark Cuban

    Mark Cuban

    56 followers

  • Jack Dorsey

    Jack Dorsey

    39 followers

See More →

Top Companies

  • SaasRise

    SaasRise

    196 followers

  • Anthropic

    Anthropic

    39 followers

  • OpenAI

    OpenAI

    21 followers

  • Hugging Face

    Hugging Face

    15 followers

  • xAI

    xAI

    12 followers

See More →

Top Investors

  • Andreessen Horowitz

    Andreessen Horowitz

    16 followers

  • Y Combinator

    Y Combinator

    15 followers

  • Sequoia Capital

    Sequoia Capital

    12 followers

  • General Catalyst

    General Catalyst

    8 followers

  • A16Z Crypto

    A16Z Crypto

    5 followers

See More →
NewsDealsSocialBlogsVideosPodcasts