Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 22 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Wed, 22 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 14 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 14 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | haproxy: HAProxy: Request smuggling via HTTP/3 parser desynchronization | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 13 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in HAProxy before 3.3.6. The HTTP/3 parser does not check that the received body length matches a previously announced content-length when the stream is closed via a frame with an empty payload. This can cause desynchronization issues with the backend server and could be used for request smuggling. The earliest affected version is 2.6. | |
| First Time appeared |
Haproxy
Haproxy haproxy |
|
| Weaknesses | CWE-130 | |
| CPEs | cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Haproxy
Haproxy haproxy |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-22T18:43:17.553Z
Reserved: 2026-03-22T00:00:00.000Z
Link: CVE-2026-33555
Updated: 2026-04-14T13:22:34.930Z
Status : Awaiting Analysis
Published: 2026-04-13T17:16:28.237
Modified: 2026-04-22T19:17:02.273
Link: CVE-2026-33555
OpenCVE Enrichment
Updated: 2026-04-14T16:35:44Z