CVE-2026-33870: Netty HTTP Codec Vulnerability Exposes Servers to Request Smuggling Attacks
A critical security flaw, designated CVE-2026-33870, has been disclosed in the widely-used `io.netty:netty-codec-http` library. The vulnerability, classified as an 'Inconsistent Interpretation of HTTP Requests' or HTTP request/response smuggling (CWE-444), allows attackers to bypass security controls and potentially poison web caches or hijack user sessions by injecting malicious requests into a data stream. This weakness stems from the library's failure to consistently parse and validate HTTP request sequences, creating a hidden channel for exploitation within applications built on the Netty framework.
The vulnerability specifically affects version 4.1.130.Final of the `netty-codec-http` artifact. Netty is a foundational asynchronous event-driven network application framework for Java, powering high-performance servers and clients across countless enterprise and web-scale applications. The flaw's presence in such a core component means a vast attack surface: any service using this vulnerable version to handle HTTP traffic could be at risk. Official advisories and technical details are now public on major security platforms including the National Vulnerability Database (NVD), GitHub Security Advisories (GHSA-pwqr-wmgm-9rr8), and the Sonatype OSS Index.
This disclosure triggers immediate pressure on development and security teams to audit their dependency chains. Organizations using Netty must urgently verify their deployed versions and apply patches or mitigations as they become available. The risk extends beyond direct exploitation; successful smuggling attacks can lead to downstream security failures, including web cache poisoning, credential theft, and the delivery of malicious content to end-users. The broad adoption of Netty in microservices architectures and API gateways amplifies the potential impact, making this a high-priority vulnerability for infrastructure and application security reviews.