Vulnerability Description
Http4s is a Scala interface for HTTP services. In versions from 1.0.0-M1 to before 1.0.0-M45 and before 0.23.31, http4s is vulnerable to HTTP Request Smuggling due to improper handling of HTTP trailer section. This vulnerability could enable attackers to bypass front-end servers security controls, launch targeted attacks against active users, and poison web caches. A pre-requisite for exploitation involves the web application being deployed behind a reverse-proxy that forwards trailer headers. This issue has been patched in versions 1.0.0-M45 and 0.23.31.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Typelevel | Http4S | < 0.23.31 |
Related Weaknesses (CWE)
References
- https://github.com/http4s/http4s/commit/dd518f7c967e5165813b8d4a48a82b8fab852d41Patch
- https://github.com/http4s/http4s/security/advisories/GHSA-wcwh-7gfw-5wrrExploitVendor Advisory
- https://github.com/http4s/http4s/security/advisories/GHSA-wcwh-7gfw-5wrrExploitVendor Advisory
FAQ
What is CVE-2025-59822?
CVE-2025-59822 is a vulnerability with a CVSS score of 7.5 (HIGH). Http4s is a Scala interface for HTTP services. In versions from 1.0.0-M1 to before 1.0.0-M45 and before 0.23.31, http4s is vulnerable to HTTP Request Smuggling due to improper handling of HTTP trailer...
How severe is CVE-2025-59822?
CVE-2025-59822 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-59822?
Check the references section above for vendor advisories and patch information. Affected products include: Typelevel Http4S.