Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.3

Cap'n Proto truncates large chunked transfer requests

CVE-2026-32240
Summary

If a large file is sent, it may be cut off, potentially allowing an attacker to trick the server into accepting malicious data. This issue is fixed in version 1.4.0, so update to that version to resolve the problem.

Original title
Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, when using Transfer-Encoding: chunked, if a chunk's size parsed to a value of 2^64 or larger, it would be t...
Original description
Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, when using Transfer-Encoding: chunked, if a chunk's size parsed to a value of 2^64 or larger, it would be truncated to a 64-bit integer. In theory, this bug could enable HTTP request/response smuggling. This vulnerability is fixed in 1.4.0.
nvd CVSS4.0 6.3
Vulnerability type
CWE-197
CWE-444
Published: 12 Mar 2026 · Updated: 14 Mar 2026 · First seen: 12 Mar 2026