We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
An issue was discovered in Akamai Ghost, as used for the Akamai CDN platform before 2025-03-26. Under certain circumstances, a client making an HTTP/1.x OPTIONS request with an "Expect: 100-continue" header, and using obsolete line folding, can lead to a discrepancy in how two in-path Akamai servers interpret the request, allowing an attacker to smuggle a second request in the original request body.
Reserved 2025-04-04 | Published 2025-08-07 | Updated 2025-08-07 | Assigner mitreCWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
developer.mozilla.org/.../docs/Web/HTTP/Reference/Status/100
www.rfc-editor.org/rfc/rfc9112.html
www.akamai.com/...rity/cve-2025-32094-http-request-smuggling
www.blackhat.com/us-25/briefings/schedule/
Support options