HTTP/2 request splitting vulnerability allows attackers to perform request smuggling attacks by injecting CRLF characters into headers. This occurs when servers downgrade HTTP/2 requests to HTTP/1.1 without properly validating header names/values, enabling attackers to manipulate request boundaries and bypass security controls.
{ "severity": "MODERATE", "github_reviewed": true, "cwe_ids": [ "CWE-93" ], "github_reviewed_at": "2025-08-25T20:44:43Z", "nvd_published_at": "2025-08-25T21:15:37Z" }