Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-38f8-5428-x5cv | Netty vulnerable to HTTP Request Smuggling due to malformed Transfer-Encoding |
Fri, 15 May 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Io.netty
Io.netty netty-codec-http Netty Netty netty |
|
| Vendors & Products |
Io.netty
Io.netty netty-codec-http Netty Netty netty |
Wed, 13 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Netty is an asynchronous, event-driven network application framework. Prior to 4.2.13.Final and 4.1.133.Final, Netty incorrectly parses malformed Transfer-Encoding, enabling request smuggling attacks. This vulnerability is fixed in 4.2.13.Final and 4.1.133.Final. | |
| Title | Netty: HTTP Request Smuggling due to malformed Transfer-Encoding | |
| Weaknesses | CWE-444 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-15T20:34:21.305Z
Reserved: 2026-04-28T17:26:12.086Z
Link: CVE-2026-42585
Updated: 2026-05-15T20:33:01.224Z
Status : Undergoing Analysis
Published: 2026-05-13T19:17:24.187
Modified: 2026-05-15T21:16:35.667
Link: CVE-2026-42585
No data.
OpenCVE Enrichment
Updated: 2026-05-14T14:34:03Z
Github GHSA