CVE-2025-1867
CRITICALCVSS Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Lifecycle Timeline
2Description
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in ithewei libhv allows HTTP Response Smuggling.This issue affects libhv: through 1.3.3.
Analysis
A critical HTTP Request/Response Smuggling vulnerability (CWE-444) in ithewei libhv library versions up to 1.3.3 allows attackers to manipulate HTTP request interpretation between frontend and backend servers. With a CVSS 4.0 score of 10.0, this vulnerability requires no authentication or user interaction and can be exploited remotely with low complexity. HTTP smuggling attacks can bypass security controls, poison web caches, hijack user sessions, and enable cross-site scripting, making this particularly dangerous in environments using libhv as a reverse proxy or HTTP server component.
Technical Context
libhv is a cross-platform C/C++ network library providing HTTP client/server, WebSocket, and event loop functionality. HTTP Request Smuggling (CWE-444) occurs when front-end and back-end servers interpret HTTP request boundaries differently, typically through ambiguous Content-Length and Transfer-Encoding headers. The libhv library is used in embedded systems, IoT devices, and as a lightweight HTTP server in C++ applications. The vulnerability likely stems from non-compliant HTTP/1.1 parsing that allows crafted requests to be split or merged differently by chained HTTP processors.
Affected Products
ithewei libhv versions up to and including 1.3.3. Applications embedding libhv as HTTP server or proxy component are affected. Common deployment contexts include IoT devices, embedded Linux systems, and lightweight C++ web services.
Remediation
Upgrade libhv to a version newer than 1.3.3 once a patch is released. As a workaround, ensure strict HTTP parsing is enforced on any reverse proxy in front of libhv (e.g., nginx proxy_request_buffering on, reject ambiguous Transfer-Encoding headers). Monitor for unusual HTTP request patterns that may indicate smuggling attempts. Consider implementing HTTP/2 end-to-end which is not susceptible to classic smuggling attacks.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today