A request smuggling vulnerability existed in the Google Cloud Classic Application Load Balancer due to improper handling of chunked-encoded HTTP requests. This allowed attackers to craft requests that could be misinterpreted by backend servers. The issue was fixed by disallowing stray data after a chunk, and is no longer exploitable. No action is required as Classic Application Load Balancer service after 2025-04-26 is not vulnerable.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://cloud.google.com/support/bulletins#gcp-2025-027 |
![]() ![]() |
History
Fri, 16 May 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 16 May 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A request smuggling vulnerability existed in the Google Cloud Classic Application Load Balancer due to improper handling of chunked-encoded HTTP requests. This allowed attackers to craft requests that could be misinterpreted by backend servers. The issue was fixed by disallowing stray data after a chunk, and is no longer exploitable. No action is required as Classic Application Load Balancer service after 2025-04-26 is not vulnerable. | |
Title | HTTP Request Smuggling in Google Cloud Classic Application Load Balancer due to Improper Chunked Encoding Validation | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Google
Published: 2025-05-16T13:47:45.266Z
Updated: 2025-05-16T14:54:22.843Z
Reserved: 2025-05-12T17:25:11.459Z
Link: CVE-2025-4600

Updated: 2025-05-16T14:54:18.102Z

Status : Awaiting Analysis
Published: 2025-05-16T14:15:32.580
Modified: 2025-05-16T14:42:18.700
Link: CVE-2025-4600

No data.