H3 is a minimal H(TTP) framework built for high performance and portability. Prior to 1.15.5, there is a critical HTTP Request Smuggling vulnerability. readRawBody is doing a strict case-sensitive check for the Transfer-Encoding header. It explicitly looks for "chunked", but per the RFC, this header should be case-insensitive. This vulnerability is fixed in 1.15.5.
References
| Link | Resource |
|---|---|
| https://github.com/h3js/h3/commit/618ccf4f37b8b6148bea7f36040471af45bfb097 | Patch |
| https://github.com/h3js/h3/security/advisories/GHSA-mp2g-9vg9-f4cg | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-01-15 20:16
Updated : 2026-01-23 18:50
NVD link : CVE-2026-23527
Mitre link : CVE-2026-23527
CVE.ORG link : CVE-2026-23527
JSON object : View
Products Affected
h3
- h3
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
