Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2026-23527

h3 v1 has Request Smuggling (TE.TE) issue
Back to all
CVE

CVE-2026-23527

h3 v1 has Request Smuggling (TE.TE) issue

I was digging into h3 v1 (specifically v1.15.4) and found a critical HTTP Request Smuggling vulnerability.

Basically, readRawBody is doing a strict case-sensitive check for the Transfer-Encoding header. It explicitly looks for "chunked", but per the RFC, this header should be case-insensitive.

The Bug: If I send a request with Transfer-Encoding: ChuNked (mixed case), h3 misses it. Since it doesn't see "chunked" and there's no Content-Length, it assumes the body is empty and processes the request immediately.

This leaves the actual body sitting on the socket, which triggers a classic TE.TE Desync (Request Smuggling) if the app is running behind a Layer 4 proxy or anything that doesn't normalize headers (like AWS NLB or Node proxies).

Vulnerable Code (src/utils/body.ts):

if (
    !Number.parseInt(event.node.req.headers["content-length"] || "") &&
    !String(event.node.req.headers["transfer-encoding"] ?? "")
      .split(",")
      .map((e) => e.trim())
      .filter(Boolean)
      .includes("chunked") // <--- This is the issue. "ChuNkEd" returns false here.
  ) {
    return Promise.resolve(undefined);
  }

I verified this locally:

  • Sent a Transfer-Encoding: ChunKed request without a closing 0 chunk.
  • Express hangs (correctly waiting for data).
  • h3 responds immediately (vulnerable, thinks body is length 0).

Impact: Since H3/Nuxt/Nitro is often used in containerized setups behind TCP load balancers, an attacker can use this to smuggle requests past WAFs or desynchronize the socket to poison other users' connections.

Fix: Just need to normalize the header value before checking:  .map((e) => e.trim().toLowerCase())

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
8.9
-
3.1
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L
C
H
U
0
-
3.1
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L
C
H
U
8.9
-
3.1
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L

Related Resources

No items found.

References

https://github.com/h3js/h3/security/advisories/GHSA-mp2g-9vg9-f4cg, https://nvd.nist.gov/vuln/detail/CVE-2026-23527, https://github.com/h3js/h3/commit/618ccf4f37b8b6148bea7f36040471af45bfb097, https://github.com/h3js/h3, https://github.com/h3js/h3/releases/tag/v1.15.5

Severity

8.9

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
8.9
EPSS Probability
0.00029%
EPSS Percentile
0.08061%
Introduced Version
0,0.7.14,0.2.0
Fix Available
1.15.5

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading