We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-32094



Description

An issue was discovered in Akamai Ghost, as used for the Akamai CDN platform before 2025-03-26. Under certain circumstances, a client making an HTTP/1.x OPTIONS request with an "Expect: 100-continue" header, and using obsolete line folding, can lead to a discrepancy in how two in-path Akamai servers interpret the request, allowing an attacker to smuggle a second request in the original request body.

Reserved 2025-04-04 | Published 2025-08-07 | Updated 2025-08-07 | Assigner mitre


MEDIUM: 4.0CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N

Problem types

CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

Product status

Default status
unaffected

Any version before 2025-03-26
affected

References

developer.mozilla.org/.../docs/Web/HTTP/Reference/Status/100

www.rfc-editor.org/rfc/rfc9112.html

www.akamai.com/...rity/cve-2025-32094-http-request-smuggling

www.blackhat.com/us-25/briefings/schedule/

cve.org (CVE-2025-32094)

nvd.nist.gov (CVE-2025-32094)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-32094

Support options

Helpdesk Chat, Email, Knowledgebase