A request smuggling vulnerability existed in the Google Cloud Classic Application Load Balancer due to improper handling of chunked-encoded HTTP requests. This allowed attackers to craft requests that could be misinterpreted by backend servers. The issue was fixed by disallowing stray data after a chunk, and is no longer exploitable. No action is required as Classic Application Load Balancer service after 2025-04-26 is not vulnerable.
References
Link | Resource |
---|---|
https://cloud.google.com/support/bulletins#gcp-2025-027 | Vendor Advisory |
Configurations
History
08 Sep 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-444 |
29 Jul 2025, 13:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://cloud.google.com/support/bulletins#gcp-2025-027 - Vendor Advisory | |
First Time |
Google application Load Balancer
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:a:google:application_load_balancer:*:*:*:*:*:*:*:* |
16 May 2025, 14:42
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-16 14:15
Updated : 2025-09-08 10:15
NVD link : CVE-2025-4600
Mitre link : CVE-2025-4600
CVE.ORG link : CVE-2025-4600
JSON object : View
Products Affected
- application_load_balancer
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')