Envoyproxy Envoy vulnerabilities
95 known vulnerabilities affecting envoyproxy/envoy.
Total CVEs
95
CISA KEV
1
actively exploited
Public exploits
1
Exploited in wild
1
Severity breakdown
CRITICAL11HIGH63MEDIUM20LOW1
Vulnerabilities
Page 1 of 5
CVE-2026-26310HIGHCVSS 7.5fixed in 1.34.13≥ 1.35.0, < 1.35.8+5 more2026-03-10
CVE-2026-26310 [HIGH] CWE-20 CVE-2026-26310: Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13,
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, calling Utility::getAddressWithPort with a scoped IPv6 addresses causes a crash. This utility is called in the data plane from the original_src filter and the dns filter. This vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13.
nvd
CVE-2026-26330HIGHCVSS 7.5fixed in 1.34.13≥ 1.35.0, < 1.35.8+5 more2026-03-10
CVE-2026-26330 [HIGH] CWE-416 CVE-2026-26330: Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13,
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, At the rate limit filter, if the response phase limit with apply_on_stream_done in the rate limit configuration is enabled and the response phase limit request fails directly, it may crash Envoy. When both the request phase limit and response phase lim
nvd
CVE-2026-26308HIGHCVSS 8.2fixed in 1.34.13≥ 1.35.0, < 1.35.8+5 more2026-03-10
CVE-2026-26308 [HIGH] CWE-863 CVE-2026-26308: Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13,
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, the Envoy RBAC (Role-Based Access Control) filter contains a logic vulnerability in how it validates HTTP headers when multiple values are present for the same header name. Instead of validating each header value individually, Envoy concatenates all va
nvd
CVE-2026-26309MEDIUMCVSS 5.3fixed in 1.34.13≥ 1.35.0, < 1.35.8+5 more2026-03-10
CVE-2026-26309 [MEDIUM] CWE-193 CVE-2026-26309: Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13,
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, an off-by-one write in Envoy::JsonEscaper::escapeString() can corrupt std::string null-termination, causing undefined behavior and potentially leading to crashes or out-of-bounds reads when the resulting string is later treated as a C-string. This vu
nvd
CVE-2026-26311MEDIUMCVSS 5.9fixed in 1.34.13≥ 1.35.0, < 1.35.8+5 more2026-03-10
CVE-2026-26311 [MEDIUM] CWE-416 CVE-2026-26311: Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13,
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, a logic vulnerability in Envoy's HTTP connection manager (FilterManager) that allows for Zombie Stream Filter Execution. This issue creates a "Use-After-Free" (UAF) or state-corruption window where filter callbacks are invoked on an HTTP stream that
nvd
CVE-2025-66220HIGHCVSS 7.1fixed in 1.33.13≥ 1.34.0, < 1.34.11+6 more2025-12-03
CVE-2025-66220 [HIGH] CWE-170 CVE-2025-66220: Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earl
Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, Envoy’s mTLS certificate matcher for match_typed_subject_alt_names may incorrectly treat certificates containing an embedded null byte (\0) inside an OTHERNAME SAN value as valid matches.
nvd
CVE-2025-64527MEDIUMCVSS 6.5fixed in 1.33.13≥ 1.34.0, < 1.34.11+6 more2025-12-03
CVE-2025-64527 [MEDIUM] CWE-476 CVE-2025-64527: Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earl
Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, Envoy crashes when JWT authentication is configured with the remote JWKS fetching, allow_missing_or_failed is enabled, multiple JWT tokens are present in the request headers and the JWKS fetch fails. This is caused by a re-entry bug in the JwksFe
nvd
CVE-2025-64763MEDIUMCVSS 5.3fixed in 1.33.13≥ 1.34.0, < 1.34.11+6 more2025-12-03
CVE-2025-64763 [MEDIUM] CWE-693 CVE-2025-64763: Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earl
Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, when Envoy is configured in TCP proxy mode to handle CONNECT requests, it accepts client data before issuing a 2xx response and forwards that data to the upstream TCP connection. If a forwarding proxy upstream from Envoy then responds with a non-
nvd
CVE-2025-62504HIGHCVSS 7.5fixed in 1.33.12≥ 1.34.0, < 1.34.10+6 more2025-10-16
CVE-2025-62504 [HIGH] CWE-416 CVE-2025-62504: Envoy is an open source edge and service proxy. Envoy versions earlier than 1.36.2, 1.35.6, 1.34.10,
Envoy is an open source edge and service proxy. Envoy versions earlier than 1.36.2, 1.35.6, 1.34.10, and 1.33.12 contain a use-after-free vulnerability in the Lua filter. When a Lua script executing in the response phase rewrites a response body so that its size exceeds the configured per_connection_buffer_limit_bytes (default 1MB), Envoy generates a
nvd
CVE-2025-62409MEDIUMCVSS 6.6fixed in 1.33.11≥ 1.34.0, < 1.34.9+6 more2025-10-16
CVE-2025-62409 [MEDIUM] CWE-476 CVE-2025-62409: Envoy is a cloud-native, open source edge and service proxy. Prior to 1.36.1, 1.35.5, 1.34.9, and 1.
Envoy is a cloud-native, open source edge and service proxy. Prior to 1.36.1, 1.35.5, 1.34.9, and 1.33.10, large requests and responses can potentially trigger TCP connection pool crashes due to flow control management in Envoy. It will happen when the connection is closing but upstream data is still coming, resulting in a buffer watermark callback
nvd
CVE-2025-54588HIGHCVSS 7.5≥ 1.34.0, < 1.34.5v1.35.0+2 more2025-09-03
CVE-2025-54588 [HIGH] CWE-416 CVE-2025-54588: Envoy is an open source L7 proxy and communication bus designed for large modern service oriented ar
Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. Versions 1.34.0 through 1.34.4 and 1.35.0 contain a use-after-free (UAF) vulnerability in the DNS cache, causing abnormal process termination. The vulnerability is in Envoy's Dynamic Forward Proxy implementation, occurring when a completion
nvd
CVE-2025-55162HIGHCVSS 8.8fixed in 1.32.10≥ 1.33.0, ≤ 1.33.7+6 more2025-09-03
CVE-2025-55162 [HIGH] CWE-613 CVE-2025-55162: Envoy is an open source L7 proxy and communication bus designed for large modern service oriented ar
Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In versions below 1.32.10 and 1.33.0 through 1.33.6, 1.34.0 through 1.34.4 and 1.35.0, insufficient Session Expiration in the Envoy OAuth2 filter leads to failed logout operations. When configured with __Secure- or __Host- prefixed cookie n
nvd
CVE-2025-46821MEDIUMCVSS 5.3fixed in 1.31.8≥ 1.32.0, < 1.32.6+5 more2025-05-07
CVE-2025-46821 [MEDIUM] CWE-186 CVE-2025-46821: Envoy is a cloud-native edge/middle/service proxy. Prior to versions 1.34.1, 1.33.3, 1.32.6, and 1.3
Envoy is a cloud-native edge/middle/service proxy. Prior to versions 1.34.1, 1.33.3, 1.32.6, and 1.31.8, Envoy's URI template matcher incorrectly excludes the `*` character from a set of valid characters in the URI path. As a result URI path containing the `*` character will not match a URI template expressions. This can result in bypass of RBAC rul
nvd
CVE-2025-30157HIGHCVSS 7.5fixed in 1.30.10≥ 1.31.0, < 1.31.6+5 more2025-03-21
CVE-2025-30157 [HIGH] CWE-460 CVE-2025-30157: Envoy is a cloud-native high-performance edge/middle/service proxy. Prior to 1.33.1, 1.32.4, 1.31.6,
Envoy is a cloud-native high-performance edge/middle/service proxy. Prior to 1.33.1, 1.32.4, 1.31.6, and 1.30.10, Envoy's ext_proc HTTP filter is at risk of crashing if a local reply is sent to the external server due to the filter's life time issue. A known situation is the failure of a websocket handshake will trigger a local reply leading to the cr
nvd
CVE-2024-53270HIGHCVSS 7.5fixed in 1.29.12≥ 1.30.0, < 1.30.9+5 more2024-12-18
CVE-2024-53270 [HIGH] CWE-670 CVE-2024-53270: Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions `sendOverlo
Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions `sendOverloadError` is going to assume the active request exists when `envoy.load_shed_points.http1_server_abort_dispatch` is configured. If `active_request` is nullptr, only onMessageBeginImpl() is called. However, the `onMessageBeginImpl` will directly return ok
nvd
CVE-2024-53269HIGHCVSS 7.5≥ 1.30.0, < 1.30.8≥ 1.31.0, < 1.31.4+4 more2024-12-18
CVE-2024-53269 [HIGH] CWE-670 CVE-2024-53269: Envoy is a cloud-native high-performance edge/middle/service proxy. When additional address are not
Envoy is a cloud-native high-performance edge/middle/service proxy. When additional address are not ip addresses, then the Happy Eyeballs sorting algorithm will crash in data plane. This issue has been addressed in releases 1.32.2, 1.31.4, and 1.30.8. Users are advised to upgrade. Users unable to upgrade may disable Happy Eyeballs and/or change the IP
nvd
CVE-2024-53271HIGHCVSS 7.1≥ 1.31.0, < 1.31.5≥ 1.32.0, ≤ 1.32.3+2 more2024-12-18
CVE-2024-53271 [HIGH] CWE-670 CVE-2024-53271: Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions envoy does
Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions envoy does not properly handle http 1.1 non-101 1xx responses. This can lead to downstream failures in networked devices. This issue has been addressed in versions 1.31.5 and 1.32.3. Users are advised to upgrade. There are no known workarounds for this issue.
nvd
CVE-2024-45810HIGHCVSS 7.5fixed in 1.28.7≥ 1.29.0, < 1.29.9+5 more2024-09-20
CVE-2024-45810 [HIGH] CWE-119 CVE-2024-45810: Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy will crash when the http a
Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy will crash when the http async client is handling `sendLocalReply` under some circumstance, e.g., websocket upgrade, and requests mirroring. The http async client will crash during the `sendLocalReply()` in http async client, one reason is http async client is duplicating the st
nvd
CVE-2024-45809HIGHCVSS 7.5≥ 1.29.0, < 1.29.9≥ 1.30.0, < 1.30.6+4 more2024-09-20
CVE-2024-45809 [HIGH] CWE-119 CVE-2024-45809: Envoy is a cloud-native high-performance edge/middle/service proxy. Jwt filter will lead to an Envoy
Envoy is a cloud-native high-performance edge/middle/service proxy. Jwt filter will lead to an Envoy crash when clear route cache with remote JWKs. In the following case: 1. remote JWKs are used, which requires async header processing; 2. clear_route_cache is enabled on the provider; 3. header operations are enabled in JWT filter, e.g. header to claim
nvd
CVE-2024-45807HIGHCVSS 7.5≥ 1.31.0, < 1.31.2v>= 1.31.0, < 1.31.22024-09-20
CVE-2024-45807 [HIGH] CWE-670 CVE-2024-45807: Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy's 1.31 is using `oghttp` a
Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy's 1.31 is using `oghttp` as the default HTTP/2 codec, and there are potential bugs around stream management in the codec. To resolve this Envoy will switch off the `oghttp2` by default. The impact of this issue is that envoy will crash. This issue has been addressed in release v
nvd
1 / 5Next →