The Eventlet WSGI parser is vulnerable to HTTP Request Smuggling due to improper handling of HTTP trailer sections.
This vulnerability could enable attackers to: - Bypass front-end security controls - Launch targeted attacks against active site users - Poison web caches
Problem has been patched in eventlet 0.40.3.
The patch just drops trailers. If a backend behind eventlet.wsgi proxy requires trailers, then this patch BREAKS your setup.
Do not use eventlet.wsgi facing untrusted clients.
{ "github_reviewed": true, "cwe_ids": [ "CWE-444" ], "severity": "MODERATE", "github_reviewed_at": "2025-08-29T20:08:24Z", "nvd_published_at": null }