lighttpd1.4.80 incorrectly merged trailer fields into headers after http request parsing. This behavior can be exploited to conduct HTTP Header Smuggling attacks.
Successful exploitation may allow an attacker to:
* Bypass access control rules
* Inject unsafe input into backend logic that trusts request headers
* Execute HTTP Request Smuggling attacks under some conditions
This issue affects lighttpd1.4.80
References
Configurations
History
12 Nov 2025, 14:34
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
| CPE | cpe:2.3:a:lighttpd:lighttpd:1.4.80:*:*:*:*:*:*:* | |
| References | () https://github.com/lighttpd/lighttpd1.4/commit/35cb89c103877de62d6b63d0804255475d77e5e1 - Patch | |
| First Time |
Lighttpd
Lighttpd lighttpd |
03 Nov 2025, 20:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-03 20:17
Updated : 2025-11-12 14:34
NVD link : CVE-2025-12642
Mitre link : CVE-2025-12642
CVE.ORG link : CVE-2025-12642
JSON object : View
Products Affected
lighttpd
- lighttpd
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
