CVE-2026-39807: Transport-State Spoofing via Untrusted URI Scheme in Bandit HTTP Server
Vulnerability ID: CVE-2026-39807
CVSS Score: 6.3
Published: 2026-05-07
The Bandit HTTP server prior to version 1.11.0 contains a transport-state spoofing vulnerability. The application incorrectly prioritizes the client-supplied URI scheme over the verified transport-layer encryption status. This allows unauthenticated attackers to spoof the connection state as secure (HTTPS) over a plaintext connection, bypassing security middleware and exposing secure cookies.
TL;DR
A logic flaw in the Bandit HTTP server allows attackers to forge the connection scheme. Sending an absolute-form HTTP request over a plaintext connection causes the server to treat the request as HTTPS, bypassing SSL redirects and leaking secure cookies.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-807
- Attack Vector: Network
- CVSS Score: 6.3
- EPSS Score: 0.00018
- Impact: Security feature bypass and confidentiality loss
- Exploit Status: Proof of Concept
- KEV Status: Not Listed
Affected Systems
- Bandit HTTP Server for Elixir
- Elixir applications utilizing Plug.Conn via Bandit
- Deployments exposing plaintext (non-TLS) HTTP ports
-
bandit: >= 1.0.0, < 1.11.0 (Fixed in:
1.11.0)
Code Analysis
Commit: 45feea2
Fix transport-state spoofing vulnerability by evaluating only adapter security state
Exploit Details
- Commit Test Suite: Unit tests implementing the spoofing payload to verify the patch effectiveness.
Mitigation Strategies
- Upgrade the bandit package to a patched version
- Disable plaintext network listeners and enforce TLS termination at the application
- Deploy a reverse proxy to sanitize absolute-form HTTP request targets
Remediation Steps:
- Update the project's mix.exs file to require bandit version 1.11.0 or later.
- Execute
mix deps.getandmix compileto pull and build the updated dependency. - Audit production deployments to verify whether plaintext ports are unintentionally exposed.
- Test downstream application behavior to ensure secure cookies and Plug.SSL correctly evaluate the patched state.
References
- GitHub Security Advisory GHSA-375f-4r2h-f99j
- EEF CNA Advisory for CVE-2026-39807
- Bandit Fix Commit 45feea20
- OSV Record EEF-CVE-2026-39807
Read the full report for CVE-2026-39807 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)