Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, when using Transfer-Encoding: chunked, if a chunk's size parsed to a value of 2^64 or larger, it would be truncated to a 64-bit integer. In theory, this bug could enable HTTP request/response smuggling. This vulnerability is fixed in 1.4.0.
References
Configurations
History
18 Mar 2026, 17:01
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| First Time |
Capnproto
Capnproto capnproto |
|
| CPE | cpe:2.3:a:capnproto:capnproto:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| References | () https://capnproto.org/capnproto-c++-1.4.0.tar.gz - Product | |
| References | () https://capnproto.org/capnproto-c++-win32-1.4.0.zip - Product | |
| References | () https://github.com/capnproto/capnproto/commit/2744b3c012b4aa3c31cefb61ec656829fa5c0e36 - Patch | |
| References | () https://github.com/capnproto/capnproto/commit/e929f0ba7901a6b8f4b5ba9a4db00af43288cbb0 - Patch | |
| References | () https://github.com/capnproto/capnproto/security/advisories/GHSA-vpcq-mx5v-32wm - Vendor Advisory |
12 Mar 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-12 20:16
Updated : 2026-03-18 17:01
NVD link : CVE-2026-32240
Mitre link : CVE-2026-32240
CVE.ORG link : CVE-2026-32240
JSON object : View
Products Affected
capnproto
- capnproto
