When malformed or abnormal HTTP requests are interpreted by one or more
entities in the data flow between the user and the web server, such as a
proxy or firewall, they can be interpreted inconsistently, allowing the
attacker to "smuggle" a request to one device without the other device
being aware of it.
Latest vulnerabilities for CWE-444
Description of CWE-444 on Mitre website