CVE-2025-66373
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-04

Last updated on: 2025-12-16

Assigner: MITRE

Description
Akamai Ghost on Akamai CDN edge servers before 2025-11-17 has a chunked request body processing error that can result in HTTP request smuggling. When Akamai Ghost receives an invalid chunked body that includes a chunk size different from the actual size of the following chunk data, under certain circumstances, Akamai Ghost erroneously forwards the invalid request and subsequent superfluous bytes to the origin server. An attacker could hide a smuggled request in these superfluous bytes. Whether this is exploitable depends on the origin server's behavior and how it processes the invalid request it receives from Akamai Ghost.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-04
Last Modified
2025-12-16
Generated
2026-05-07
AI Q&A
2025-12-04
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
akamai akamaighost to 2025-11-17 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-444 The product acts as an intermediary HTTP agent (such as a proxy or firewall) in the data flow between two entities such as a client and server, but it does not interpret malformed HTTP requests or responses in ways that are consistent with how the messages will be processed by those entities that are at the ultimate destination.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Akamai Ghost on Akamai CDN edge servers involves an error in processing chunked HTTP request bodies. Specifically, when the server receives a chunked request body where the declared chunk size does not match the actual size of the chunk data, Akamai Ghost may incorrectly forward the invalid request along with extra bytes to the origin server. An attacker can exploit this behavior to hide a smuggled HTTP request within these extra bytes, potentially bypassing security controls.


How can this vulnerability impact me? :

The vulnerability can allow an attacker to perform HTTP request smuggling by sending specially crafted chunked requests. This can lead to unauthorized requests being processed by the origin server, potentially bypassing security mechanisms, causing data leakage, session hijacking, or other malicious actions depending on how the origin server handles the smuggled requests.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart