h2 allows HTTP Request Smuggling due to illegal characters in headers
Description
Published to the GitHub Advisory Database
Aug 25, 2025
Reviewed
Aug 25, 2025
Published by the National Vulnerability Database
Aug 25, 2025
Last updated
Aug 26, 2025
Summary
HTTP/2 request splitting vulnerability allows attackers to perform request smuggling attacks by injecting CRLF characters into headers. This occurs when servers downgrade HTTP/2 requests to HTTP/1.1 without properly validating header names/values, enabling attackers to manipulate request boundaries and bypass security controls.
References