HTTP/2 request splitting vulnerability allows attackers to perform request smuggling attacks by injecting CRLF characters into headers. This occurs when servers downgrade HTTP/2 requests to HTTP/1.1 without properly validating header names/values, enabling attackers to manipulate request boundaries and bypass security controls.
{
"github_reviewed": true,
"nvd_published_at": "2025-08-25T21:15:37Z",
"cwe_ids": [
"CWE-93"
],
"github_reviewed_at": "2025-08-25T20:44:43Z",
"severity": "MODERATE"
}