Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.3

Cap'n Proto allows malicious HTTP requests with fake sizes

CVE-2026-32239
Summary

A bug in Cap'n Proto versions before 1.4.0 allows malicious actors to send fake HTTP requests, potentially leading to security issues. This vulnerability has been fixed in version 1.4.0. To ensure security, update to the latest version of Cap'n Proto.

Original title
Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, a negative Content-Length value was converted to unsigned, treating it as an impossibly large length instea...
Original description
Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, a negative Content-Length value was converted to unsigned, treating it as an impossibly large length instead. In theory, this bug could enable HTTP request/response smuggling. This vulnerability is fixed in 1.4.0.
nvd CVSS4.0 6.3
Vulnerability type
CWE-190 Integer Overflow
CWE-444
Published: 12 Mar 2026 · Updated: 14 Mar 2026 · First seen: 12 Mar 2026