CVE-2025-58056

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-58056
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-58056.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-58056
Aliases
Downstream
Related
Published
2025-09-03T20:56:50Z
Modified
2025-10-10T17:52:04.025399Z
Severity
  • 2.9 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P CVSS Calculator
Summary
Netty is vulnerable to request smuggling due to incorrect parsing of chunk extensions
Details

Netty is an asynchronous event-driven network application framework for development of maintainable high performance protocol servers and clients. In versions 4.1.124.Final, and 4.2.0.Alpha3 through 4.2.4.Final, Netty incorrectly accepts standalone newline characters (LF) as a chunk-size line terminator, regardless of a preceding carriage return (CR), instead of requiring CRLF per HTTP/1.1 standards. When combined with reverse proxies that parse LF differently (treating it as part of the chunk extension), attackers can craft requests that the proxy sees as one request but Netty processes as two, enabling request smuggling attacks. This is fixed in versions 4.1.125.Final and 4.2.5.Final.

References

Affected packages

Git / github.com/netty/netty

Affected ranges

Type
GIT
Repo
https://github.com/netty/netty
Events

Affected versions

netty-4.*

netty-4.2.0.Alpha3
netty-4.2.0.Alpha4
netty-4.2.0.Alpha5
netty-4.2.0.Beta1
netty-4.2.0.Final
netty-4.2.0.RC1
netty-4.2.0.RC2
netty-4.2.0.RC3
netty-4.2.0.RC4
netty-4.2.1.Final
netty-4.2.2.Final
netty-4.2.3.Final
netty-4.2.4.Final