Netty is an asynchronous, event-driven network application framework. Prior to 4.2.13.Final and 4.1.133.Final, Netty's chunk size parser silently overflows int, enabling request smuggling attacks. This vulnerability is fixed in 4.2.13.Final and 4.1.133.Final.
Project Subscriptions
No data.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-m4cv-j2px-7723 | Netty vulnerable to HTTP Request Smuggling due to incorrect chunk size parsing |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 13 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Netty is an asynchronous, event-driven network application framework. Prior to 4.2.13.Final and 4.1.133.Final, Netty's chunk size parser silently overflows int, enabling request smuggling attacks. This vulnerability is fixed in 4.2.13.Final and 4.1.133.Final. | |
| Title | Netty: HTTP Request Smuggling due to incorrect chunk size parsing | |
| Weaknesses | CWE-190 CWE-444 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T18:04:03.690Z
Reserved: 2026-04-28T17:26:12.085Z
Link: CVE-2026-42580
No data.
Status : Received
Published: 2026-05-13T19:17:23.490
Modified: 2026-05-13T19:17:23.490
Link: CVE-2026-42580
No data.
OpenCVE Enrichment
Updated: 2026-05-13T19:45:03Z
Github GHSA