The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-2836

CVE-2026-2836: Pingora HTTP Proxy Cache Poisoning Flaw

CVE-2026-2836 is a cache poisoning vulnerability in Pingora HTTP proxy framework's default cache key construction that enables cross-tenant data leakage. This article covers technical details, affected versions, and steps to secure your deployment.

Published: March 6, 2026

CVE-2026-2836 Overview

A cache poisoning vulnerability has been identified in the Pingora HTTP proxy framework's default cache key construction mechanism. The vulnerability stems from the default HTTP cache key implementation generating cache keys using only the URI path, while excluding critical factors such as the host header (authority). Organizations relying on the default cache key implementation are vulnerable to cache poisoning attacks, which may result in cross-origin responses being improperly served to users.

Critical Impact

This vulnerability enables cross-tenant data leakage and cache poisoning attacks in multi-tenant deployments. Attackers can poison the cache to serve malicious content to legitimate users or cause users from one tenant to receive cached responses intended for another tenant.

Affected Products

  • Pingora HTTP Proxy Framework versions prior to v0.8.0
  • Deployments using the default CacheKey implementation
  • Multi-tenant proxy configurations relying on default cache key behavior

Discovery Timeline

  • March 5, 2026 - CVE-2026-2836 published to NVD
  • March 5, 2026 - Last updated in NVD database

Technical Details for CVE-2026-2836

Vulnerability Analysis

This cache poisoning vulnerability arises from a fundamental design flaw in how the default cache key is constructed within the Pingora framework. The default CacheKey implementation uses only the URI path to generate cache keys, omitting essential request attributes that differentiate requests across different origins, tenants, or schemes.

In a properly configured caching proxy, cache keys must incorporate multiple factors to ensure cache isolation between different hosts, origins, and request contexts. When the host header (authority) is not included in the cache key calculation, requests to different hosts sharing the same URI path will resolve to the same cache entry.

This creates two primary attack scenarios. First, cross-tenant data leakage becomes possible in multi-tenant deployments where an attacker can poison the cache so that users from one tenant receive cached responses originally intended for another tenant. Second, traditional cache poisoning attacks allow adversaries to serve malicious content to legitimate users by poisoning shared cache entries with attacker-controlled responses.

Cloudflare's CDN infrastructure was not affected by this vulnerability, as Cloudflare's default cache key implementation uses multiple factors to prevent cache key poisoning and never utilized the previously provided default implementation.

Root Cause

The root cause of this vulnerability lies in the insufficient default implementation of cache key generation within the Pingora framework. The default CacheKey callback only considers the URI path when constructing cache keys, failing to incorporate the host header, HTTP scheme of the upstream peer, and other request attributes that should differentiate cached responses.

This architectural oversight means that any Pingora deployment using alpha proxy caching features with the default implementation lacks proper cache isolation. Without explicit implementation of a custom cache key callback that includes appropriate differentiating factors, the cache cannot distinguish between requests from different origins.

Attack Vector

The attack vector is network-based, requiring no special privileges to execute. An attacker can exploit this vulnerability by sending crafted HTTP requests to the vulnerable Pingora proxy instance. The attack flow involves the attacker first sending a malicious request with a specific URI path, which gets cached by the proxy.

Subsequently, when legitimate users request the same URI path but potentially for a different host or origin, the proxy serves the attacker's cached response instead of fetching the correct content from the intended backend server.

The vulnerability mechanism centers on the cache key collision. When two requests with different host headers but identical URI paths are processed, they generate the same cache key. This allows an attacker controlling responses for one host to poison cache entries that will be served to users requesting content from a completely different host. For detailed technical analysis, refer to the Pingora GitHub repository.

Detection Methods for CVE-2026-2836

Indicators of Compromise

  • Unexpected cache hit responses for requests that should be cache misses
  • Users receiving content intended for different tenants or origins
  • Anomalous cache key collisions in proxy logs
  • Reports of cross-origin content being served to users

Detection Strategies

  • Monitor cache hit/miss ratios for unusual patterns indicating potential poisoning
  • Implement logging of host headers alongside cache key generation to identify collisions
  • Audit Pingora configuration to verify custom CacheKey implementations are in use
  • Review proxy access logs for requests with mismatched host headers and response origins

Monitoring Recommendations

  • Configure alerting for cache entries being served to requests with non-matching host headers
  • Implement anomaly detection on cache utilization patterns across different tenants
  • Enable detailed cache operation logging to track key generation and entry retrieval
  • Monitor for unexpected response content types or origins in cached responses

How to Mitigate CVE-2026-2836

Immediate Actions Required

  • Upgrade Pingora to version v0.8.0 or higher immediately
  • Audit all existing Pingora deployments for usage of the default CacheKey implementation
  • Implement custom cache key callbacks that include host header and upstream HTTP scheme
  • Review multi-tenant configurations for potential data isolation breaches

Patch Information

The recommended remediation is to upgrade to Pingora v0.8.0 or higher. This version removes the insecure default cache key implementation entirely, requiring users to explicitly implement their own callback that includes appropriate factors such as the Host header, origin server HTTP scheme, and other attributes specific to their caching requirements.

For users unable to immediately upgrade to v0.8.0, the mitigation path involves removing any usage of the default CacheKey and implementing a custom callback. At minimum, custom implementations should include the host header (authority) and the upstream peer's HTTP scheme to ensure proper cache isolation.

Additional technical details and upgrade guidance are available at the Pingora GitHub repository.

Workarounds

  • Implement a custom CacheKey callback that includes the host header and HTTP scheme
  • Disable proxy caching functionality until a proper cache key implementation is deployed
  • Configure separate cache namespaces for different tenants in multi-tenant environments
  • Add host header validation to reject requests with suspicious or unexpected host values
bash
# Configuration example
# Upgrade Pingora to the patched version
cargo update -p pingora --precise 0.8.0

# Verify the installed version
cargo tree -p pingora | grep pingora

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechPingora

  • SeverityHIGH

  • CVSS Score8.4

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityNone
  • Technical References
  • GitHub PoC Repository
  • Related CVEs
  • CVE-2026-2835: Pingora HTTP Request Smuggling Vulnerability

  • CVE-2026-2833: Pingora HTTP Smuggling Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English