icon

We found results for “

CVE-2025-67735

Good to know:

icon
icon
icon

Date: December 15, 2025

Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.129.Final and 4.2.8.Final, the "io.netty.handler.codec.http.HttpRequestEncoder" has a CRLF injection with the request URI when constructing a request. This leads to request smuggling when "HttpRequestEncoder" is used without proper sanitization of the URI. Any application / framework using "HttpRequestEncoder" can be subject to be abused to perform request smuggling using CRLF injection. Versions 4.1.129.Final and 4.2.8.Final fix the issue.

Severity Score

Severity Score

Weakness Type (CWE)

Improper Neutralization of CRLF Sequences ('CRLF Injection')

CWE-93

Top Fix

icon

Upgrade Version

Upgrade to version io.netty:netty-codec-http:4.2.8.Final;io.netty:netty-codec-http:4.1.129.Final;https://github.com/netty/netty.git - netty-4.1.129.Final;https://github.com/netty/netty.git - netty-4.2.8.Final

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): LOW
Integrity (I): LOW
Availability (A): NONE

Do you need more information?

Contact Us