An issue was discovered in HAProxy before 3.3.6. The HTTP/3 parser does not check that the received body length matches a previously announced content-length when the stream is closed via a frame with an empty payload. This can cause desynchronization issues with the backend server and could be used for request smuggling. The earliest affected version is 2.6.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 13 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in HAProxy before 3.3.6. The HTTP/3 parser does not check that the received body length matches a previously announced content-length when the stream is closed via a frame with an empty payload. This can cause desynchronization issues with the backend server and could be used for request smuggling. The earliest affected version is 2.6. | |
| First Time appeared |
Haproxy
Haproxy haproxy |
|
| Weaknesses | CWE-130 | |
| CPEs | cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Haproxy
Haproxy haproxy |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-13T16:22:13.958Z
Reserved: 2026-03-22T00:00:00.000Z
Link: CVE-2026-33555
No data.
Status : Received
Published: 2026-04-13T17:16:28.237
Modified: 2026-04-13T17:16:28.237
Link: CVE-2026-33555
No data.
OpenCVE Enrichment
No data.
Weaknesses