Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cloudflare Fixes Critical Pingora Vulnerabilities

Cloudflare Fixes Critical Pingora Vulnerabilities

Posted on March 10, 2026 By CWS

Cloudflare has issued an update to its open-source Pingora framework, releasing version 0.8.0 to address three critical security vulnerabilities. These issues, identified as CVE-2026-2833, CVE-2026-2835, and CVE-2026-2836, posed risks of HTTP request smuggling and cache poisoning, which could severely impact standalone Pingora setups that are directly exposed to the internet.

Vulnerabilities Overview

The vulnerabilities were discovered by security researcher Rajat Raghav through Cloudflare’s Bug Bounty Program. Each flaw carries a high severity rating, with scores reaching up to 9.3 out of 10. If left unresolved, these vulnerabilities allow attackers to bypass critical security controls, such as proxy-level Access Control Lists (ACLs) and Web Application Firewalls (WAFs), potentially hijack user sessions, and compromise upstream connections.

Among the vulnerabilities, one specifically involves an attack known as a desynchronization (desync) attack, where an attacker might send an upgrade request followed by a partial HTTP request to exploit the system.

Details of Each Vulnerability

The first issue, classified as CVE-2026-2833, arises from the way Pingora processes HTTP/1.1 connection upgrade headers. When Pingora receives an “Upgrade” header, it prematurely enters passthrough mode, bypassing backend server confirmation. This vulnerability allows an attacker to append a hidden request, evading security measures and possibly taking control of user sessions.

CVE-2026-2835 centers on Pingora’s handling of HTTP/1.0 requests, where it improperly parses request bodies and “Transfer-Encoding: chunked” headers. This discrepancy leads to connection desynchronization, which attackers could exploit to insert malicious payloads.

The third flaw, CVE-2026-2836, pertains to Pingora’s default cache key construction. The framework’s reliance on the URI path alone, without considering the host header or HTTP scheme, results in cache key collisions. This enables attackers to force cache poisoning, delivering harmful responses to users.

Mitigation and Recommendations

To mitigate these risks, Cloudflare advises all organizations utilizing standalone Pingora proxies to promptly update to version 0.8.0 or later. This update corrects the parsing logic, ensuring stricter compliance with RFC standards.

Additionally, Cloudflare recommends implementing custom cache keys. The latest version eliminates the insecure default cache key, requiring users to create a custom callback incorporating the host header, HTTP scheme, and URI path to maintain cache integrity.

If an immediate update isn’t feasible, Cloudflare suggests temporary measures such as configuring request filters to reject any request with an “Upgrade” header and blocking non-HTTP/1.1 requests or those with invalid Content-Length headers.

For more cybersecurity updates and to feature your stories, follow Cloudflare on Google News, LinkedIn, and X.

Cyber Security News Tags:bug bounty, cache poisoning, Cloudflare, CVE, Cybersecurity, HTTP, network security, Open Source, Pingora, request smuggling, security patch, software update, Vulnerabilities

Post navigation

Previous Post: Kevin Mandia’s Armadin Secures $190 Million for AI Cybersecurity
Next Post: Hackers Exploit ZIP File Flaw to Evade Detection

Related Posts

Pulsar RAT Attacking Windows Systems via Per-user Run Registry Key and Exfiltrates Sensitive Details Pulsar RAT Attacking Windows Systems via Per-user Run Registry Key and Exfiltrates Sensitive Details Cyber Security News
Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities Cyber Security News
Windows Admin Center Vulnerability (CVE-2025-64669) Let Attackers Escalate Privileges Windows Admin Center Vulnerability (CVE-2025-64669) Let Attackers Escalate Privileges Cyber Security News
ChatGPT Atlas Stores OAuth Tokens Unencrypted Leads to Unauthorized Access to User Accounts ChatGPT Atlas Stores OAuth Tokens Unencrypted Leads to Unauthorized Access to User Accounts Cyber Security News
Windows 11 Gets New Black Screen of Death With Auto Recovery Tool Windows 11 Gets New Black Screen of Death With Auto Recovery Tool Cyber Security News
What You Need to Pay Attention to Right Now  What You Need to Pay Attention to Right Now  Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Exploit ZIP File Flaw to Evade Detection
  • Cloudflare Fixes Critical Pingora Vulnerabilities
  • Kevin Mandia’s Armadin Secures $190 Million for AI Cybersecurity
  • Fortinet FortiManager Flaw Risks Unauthorized Command Execution
  • Ericsson Data Breach Exposes Thousands’ Information

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Exploit ZIP File Flaw to Evade Detection
  • Cloudflare Fixes Critical Pingora Vulnerabilities
  • Kevin Mandia’s Armadin Secures $190 Million for AI Cybersecurity
  • Fortinet FortiManager Flaw Risks Unauthorized Command Execution
  • Ericsson Data Breach Exposes Thousands’ Information

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News