Fix reqwest — CVE-2023-44487 HIGH
Fix CVE-2023-44487 (HIGH) in reqwest for Rust. Paste your Cargo.toml into PackageFix and get a patched version — no CLI, no signup. Http/2 rapid reset via hyper dependency.
⚠ Vulnerability
CVE-2023-44487 (HIGH) — HTTP/2 rapid reset via hyper dependency in reqwest below 0.12.3.
Vulnerable — Cargo.toml
reqwest = "0.11.18"
Fixed — Cargo.toml
reqwest = "0.12.3"
✓ Fix
Update reqwest to 0.12.3 and run cargo update.
Paste your manifest — get back a fixed version with all CVEs patched in seconds.
Open PackageFix →No signup · No CLI · No GitHub connection · Runs 100% in your browser
CVE Details
| Field | Value |
|---|---|
| CVE ID | CVE-2023-44487 |
| Severity | HIGH |
| Package | reqwest (Rust) |
| Safe version | 0.12.3 |
| CISA KEV | — |
| Description | Http/2 rapid reset via hyper dependency |
Frequently Asked Questions
What is CVE-2023-44487?
CVE-2023-44487 is a HIGH severity vulnerability in reqwest (Rust) that allows HTTP/2 rapid reset via hyper dependency. Update to 0.12.3 or later.
How do I fix CVE-2023-44487 in reqwest?
Update reqwest to version 0.12.3 in your Cargo.toml and run cargo update.
Is CVE-2023-44487 being actively exploited?
Check packagefix.dev — the CISA KEV catalog updates daily.
How do I verify the fix for CVE-2023-44487?
After updating, paste your Cargo.toml into PackageFix again. If CVE-2023-44487 no longer appears in the CVE table, the fix is applied.