An issue was discovered in HAProxy before 3.3.6. The HTTP/3 parser does not check that the received body length matches a previously announced content-length when the stream is closed via a frame with an empty payload. This can cause desynchronization issues with the backend server and could be used for request smuggling. The earliest affected version is 2.6.
History

Mon, 13 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Description An issue was discovered in HAProxy before 3.3.6. The HTTP/3 parser does not check that the received body length matches a previously announced content-length when the stream is closed via a frame with an empty payload. This can cause desynchronization issues with the backend server and could be used for request smuggling. The earliest affected version is 2.6.
First Time appeared Haproxy
Haproxy haproxy
Weaknesses CWE-130
CPEs cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:*
Vendors & Products Haproxy
Haproxy haproxy
References
Metrics cvssV3_1

{'score': 4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-13T16:22:13.958Z

Reserved: 2026-03-22T00:00:00.000Z

Link: CVE-2026-33555

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-13T17:16:28.237

Modified: 2026-04-13T17:16:28.237

Link: CVE-2026-33555

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.