Starlet versions through 0.31 for Perl allows HTTP Request Smuggling via Improper Header Precedence.

Starlet incorrectly prioritizes "Content-Length" over "Transfer-Encoding: chunked" when both headers are present in an HTTP request. Per RFC 7230 3.3.3, Transfer-Encoding must take precedence.

An attacker could exploit this to smuggle malicious HTTP requests via a front-end reverse proxy.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

Migrate to Starman 0.4018 or later which has fixed this issue or apply the patch.

History

Sun, 03 May 2026 05:30:00 +0000

Type Values Removed Values Added
References

Sun, 03 May 2026 01:15:00 +0000

Type Values Removed Values Added
Description Starlet versions through 0.31 for Perl allows HTTP Request Smuggling via Improper Header Precedence. Starlet incorrectly prioritizes "Content-Length" over "Transfer-Encoding: chunked" when both headers are present in an HTTP request. Per RFC 7230 3.3.3, Transfer-Encoding must take precedence. An attacker could exploit this to smuggle malicious HTTP requests via a front-end reverse proxy.
Title Starlet versions through 0.31 for Perl allows HTTP Request Smuggling via Improper Header Precedence
Weaknesses CWE-444
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-05-03T03:04:55.098Z

Reserved: 2026-04-14T11:35:53.644Z

Link: CVE-2026-40561

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-03T01:15:58.390

Modified: 2026-05-03T05:15:58.487

Link: CVE-2026-40561

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-03T02:30:05Z

Weaknesses