Vulnerability Description
A request smuggling vulnerability existed in the Google Cloud Classic Application Load Balancer due to improper handling of chunked-encoded HTTP requests. This allowed attackers to craft requests that could be misinterpreted by backend servers. The issue was fixed by disallowing stray data after a chunk, and is no longer exploitable. No action is required as Classic Application Load Balancer service after 2025-04-26 is not vulnerable.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Application Load Balancer | < 2025-04-26 |
Related Weaknesses (CWE)
References
- https://cloud.google.com/support/bulletins#gcp-2025-027Vendor Advisory
FAQ
What is CVE-2025-4600?
CVE-2025-4600 is a vulnerability with a CVSS score of 7.5 (HIGH). A request smuggling vulnerability existed in the Google Cloud Classic Application Load Balancer due to improper handling of chunked-encoded HTTP requests. This allowed attackers to craft requests that...
How severe is CVE-2025-4600?
CVE-2025-4600 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-4600?
Check the references section above for vendor advisories and patch information. Affected products include: Google Application Load Balancer.