Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. h3
  4. ›
  5. CVE-2026-23527

CVE-2026-23527: h3 v1 has Request Smuggling (TE.TE) issue

January 15, 2026

I was digging into h3 v1 (specifically v1.15.4) and found a critical HTTP Request Smuggling vulnerability.

Basically, readRawBody is doing a strict case-sensitive check for the Transfer-Encoding header. It explicitly looks for “chunked”, but per the RFC, this header should be case-insensitive.

The Bug: If I send a request with Transfer-Encoding: ChuNked (mixed case), h3 misses it. Since it doesn’t see “chunked” and there’s no Content-Length, it assumes the body is empty and processes the request immediately.

This leaves the actual body sitting on the socket, which triggers a classic TE.TE Desync (Request Smuggling) if the app is running behind a Layer 4 proxy or anything that doesn’t normalize headers (like AWS NLB or Node proxies).

Vulnerable Code (src/utils/body.ts):

if (
!Number.parseInt(event.node.req.headers["content-length"] || "") &&
!String(event.node.req.headers["transfer-encoding"] ?? "")
.split(",")
.map((e) => e.trim())
.filter(Boolean)
.includes("chunked") // <--- This is the issue. "ChuNkEd" returns false here.
) {
return Promise.resolve(undefined);
}

I verified this locally:

  • Sent a Transfer-Encoding: ChunKed request without a closing 0 chunk.
  • Express hangs (correctly waiting for data).
  • h3 responds immediately (vulnerable, thinks body is length 0).

Impact: Since H3/Nuxt/Nitro is often used in containerized setups behind TCP load balancers, an attacker can use this to smuggle requests past WAFs or desynchronize the socket to poison other users’ connections.

Fix: Just need to normalize the header value before checking: .map((e) => e.trim().toLowerCase())

References

  • github.com/advisories/GHSA-mp2g-9vg9-f4cg
  • github.com/h3js/h3
  • github.com/h3js/h3/releases/tag/v1.15.5
  • github.com/h3js/h3/security/advisories/GHSA-mp2g-9vg9-f4cg
  • nvd.nist.gov/vuln/detail/CVE-2026-23527

Code Behaviors & Features

Detect and mitigate CVE-2026-23527 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.15.5

Fixed versions

  • 1.15.5

Solution

Upgrade to version 1.15.5 or above.

Impact 8.9 HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L

Learn more about CVSS

Weakness

  • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

Source file

npm/h3/CVE-2026-23527.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 04 Feb 2026 00:37:15 +0000.