CVE-2026-26365: Incorrect processing of “Connection: Transfer-Encoding”

Akamai Wave Blue

Feb 20, 2026

Akamai InfoSec

Akamai Wave Blue

Written by

Akamai InfoSec

Share

On February 6, 2026, Akamai eliminated a potential HTTP request smuggling vector, due to a bug in the processing of custom hop-by-hop HTTP headers.

Background

HTTP defines a set of hop-by-hop headers intended to be processed only by the first proxy receiving them and then immediately removed from the request, never forwarded to the next server. 

In addition to the hop-by-hop headers specified in the HTTP standard, clients can define their own custom hop-by-hop headers by listing these header names in the “Connection” header; for example, “Connection: My-Custom-Hop-By-Hop-Header.”

Vulnerability details

Akamai edge servers contained a bug due to improper processing of requests specifying “Transfer-Encoding” as a custom hop-by-hop header. Specifically, an attacker could craft a malicious request including the header “Connection: Transfer-Encoding”, which would result in a forward request that contained improper message framing, potentially leading to an HTTP request smuggling attack.

Whether this vulnerability was exploitable in practice depended on the internal Akamai processing path chosen for delivery of that particular request and the origin server’s behavior when receiving such a request.

Mitigation

Akamai became aware of this issue on December 30, 2025, and promptly started an investigation. On February 6, 2026, a full fix was deployed, completely eliminating the vulnerability from all Akamai services. No remediation action is required by customers.

As part of our regular incident response work and vulnerability analysis, we have disclosed this issue via CVE-2026-26365.

Special thanks

We thank “Jake Murphy of Google Cloud's Mandiant team” for reporting this issue through Akamai’s bug bounty program and coordinating with us throughout our investigation.

Akamai Wave Blue

Feb 20, 2026

Akamai InfoSec

Akamai Wave Blue

Written by

Akamai InfoSec

Tags

Share

Related Blog Posts

Security Research
One Is a Fluke, 3 Is a Pattern: MCP Back-End Vulnerabilities
May 12, 2026
Akamai researchers uncover vulnerabilities in three MCP servers. Learn about CVE-2025-66335 and how to secure your AI-to-backend connection.
Security Research
CVE-2026-34354: Guardicore Local Privilege Escalation Vulnerability
May 08, 2026
Read the technical details of a security vulnerability (CVE-2026-34354) in Akamai Guardicore Platform Agent for Windows — and get clear guidance on mitigation.
Security Research
The New Ouroboros Technique and How It Fits in dMSA’s Security Model
May 04, 2026
dMSA is more than a service account migration feature. Learn what its security model is trying to protect, how the implementation works, and where Ouroboros fits.