A request smuggling vulnerability existed in the Google Cloud Classic Application Load Balancer due to improper handling of chunked-encoded HTTP requests. This allowed attackers to craft requests that could be misinterpreted by backend servers. The issue was fixed by disallowing stray data after a chunk, and is no longer exploitable. No action is required as Classic Application Load Balancer service after 2025-04-26 is not vulnerable.
References
Link | Resource |
---|---|
https://cloud.google.com/support/bulletins#gcp-2025-027 | Vendor Advisory |
Configurations
History
29 Jul 2025, 13:03
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://cloud.google.com/support/bulletins#gcp-2025-027 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:a:google:application_load_balancer:*:*:*:*:*:*:*:* | |
First Time |
Google
Google application Load Balancer |
16 May 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-16 14:15
Updated : 2025-07-29 13:03
NVD link : CVE-2025-4600
Mitre link : CVE-2025-4600
CVE.ORG link : CVE-2025-4600
JSON object : View
Products Affected
- application_load_balancer
CWE
CWE-20
Improper Input Validation