CVE-2026-2836
Received Received - Intake
Cache Poisoning in Pingora Proxy Due to Insecure Cache Key

Publication date: 2026-03-05

Last updated on: 2026-03-12

Assigner: Cloudflare, Inc.

Description
A cache poisoning vulnerability has been found in the Pingora HTTP proxy framework’s default cache key construction. The issue occurs because the default HTTP cache key implementation generates cache keys using only the URI path, excluding critical factors such as the host header (authority). Operators relying on the default are vulnerable to cache poisoning, and cross-origin responses may be improperly served to users. Impact This vulnerability affects users of Pingora's alpha proxy caching feature who relied on the default CacheKey implementation. An attacker could exploit this for: * Cross-tenant data leakage: In multi-tenant deployments, poison the cache so that users from one tenant receive cached responses from another tenant * Cache poisoning attacks: Serve malicious content to legitimate users by poisoning shared cache entries Cloudflare's CDN infrastructure was not affected by this vulnerability, as Cloudflare's default cache key implementation uses multiple factors to prevent cache key poisoning and never made use of the previously provided default. Mitigation: We strongly recommend Pingora users to upgrade to Pingora v0.8.0 or higher, which removes the insecure default cache key implementation. Users must now explicitly implement their own callback that includes appropriate factors such as Host header, origin server HTTP scheme, and other attributes their cache should vary on. Pingora users on previous versions may also remove any of their default CacheKey usage and implement their own that should at minimum include the host header / authority and upstream peer’s HTTP scheme.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-05
Last Modified
2026-03-12
Generated
2026-05-07
AI Q&A
2026-03-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
cloudflare pingora to 0.8.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-345 The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a cache poisoning issue found in the Pingora HTTP proxy framework's default cache key construction. The problem arises because the default cache key only uses the URI path to generate cache keys, ignoring important elements like the host header (authority). As a result, attackers can poison the cache, causing users to receive incorrect or malicious cached responses, including cross-origin responses.


How can this vulnerability impact me? :

If you use Pingora's alpha proxy caching feature with the default CacheKey implementation, this vulnerability can lead to serious impacts.

  • Cross-tenant data leakage: In multi-tenant environments, attackers can poison the cache so that users from one tenant receive cached responses intended for another tenant.
  • Cache poisoning attacks: Attackers can serve malicious content to legitimate users by poisoning shared cache entries.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, it is strongly recommended to upgrade to Pingora version 0.8.0 or higher, which removes the insecure default cache key implementation.

If upgrading is not immediately possible, users should remove any usage of the default CacheKey implementation and explicitly implement their own cache key callback. This custom implementation should at minimum include the Host header (authority) and the upstream peer’s HTTP scheme to prevent cache poisoning.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart