Back to VulnFeed / CVE-2026-40561
root@hackertop:~/vulnfeed/CVE-2026-40561#
CVE-2026-40561 HIGH Request Smuggling ✓ Patched◉ PoC 公开◉ Mitigation Active Lifecycle 5/7

KAZUHO Starlet up to 0.31 on Perl Reverse Proxy Content-Length request smuggling

Starlet 18d ago Impact pending confirmation
LIFECYCLE
7.0 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability, which was classified as critical, has been found in KAZUHO Starlet up to 0.31 on Perl. This issue affects an unknown code of the component Reverse Proxy Handler. Applying the patch a7d5dfd1862aafa43e5eaca0fdb6acf4cc15b2d0 is able to eliminate this problem. The bugfix is ready for download at github.com.
Root Cause Analysis
The manipulation of the argument Content-Length with an unknown input leads to a unknown weakness. Using CWE to declare the problem leads to CWE-444. The product acts as an intermediary HTTP agent
(such as a proxy or firewall) in the data flow between two
entities such as a client and server, but it does not
interpret malformed HTTP requests or responses in ways that
are consistent with how the messages will be processed by
those entities that are at the ultimate destination.

Impact: Impacted is confidentiality, integrity, and availability.

Countermeasure: Applying the patch a7d5dfd1862aafa43e5eaca0fdb6acf4cc15b2d0 is able to eliminate this problem. The bugfix is ready for download at github.com.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-40561 · CVSS 7.0 · Patched