CVE-2026-26311Use After Free in Envoy

CWE-416Use After Free9 documents5 sources
Severity
5.9MEDIUMNVD
EPSS
0.0%
top 97.55%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 10

Description

Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, a logic vulnerability in Envoy's HTTP connection manager (FilterManager) that allows for Zombie Stream Filter Execution. This issue creates a "Use-After-Free" (UAF) or state-corruption window where filter callbacks are invoked on an HTTP stream that has already been logically reset and cleaned up. The vulnerability resides in source/common/http/filter_manager.cc within the FilterManager::decodeDa

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.2 | Impact: 3.6

Affected Packages3 packages

CVEListV5envoyproxy/envoy< 1.34.13+3
NVDenvoyproxy/envoy1.35.01.35.8+3
Gogithub.com/envoyproxy_envoy1.36.01.36.4+2

🔴Vulnerability Details

3
CVEList
Envoy HTTP: filter chain execution on reset streams causing UAF crash2026-03-10
GHSA
Envoy: HTTP - filter chain execution on reset streams causing UAF crash2026-03-10
OSV
Envoy: HTTP - filter chain execution on reset streams causing UAF crash2026-03-10

🕵️Threat Intelligence

5
Wiz
CVE-2026-26308 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2026-26310 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2026-26311 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2026-26309 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2026-26330 Impact, Exploitability, and Mitigation Steps | Wiz