Github.Com Envoyproxy Envoy vulnerabilities

11 known vulnerabilities affecting github.com/envoyproxy_envoy.

Total CVEs
11
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH2MEDIUM7LOW1

Vulnerabilities

Page 1 of 1
CVE-2026-26308HIGH≥ 1.37.0, < 1.37.1≥ 1.36.0, < 1.36.5+2 more2026-03-10
CVE-2026-26308 [HIGH] CWE-20 Envoy has RBAC Header Validation Bypass via Multi-Value Header Concatenation Envoy has RBAC Header Validation Bypass via Multi-Value Header Concatenation ## 1. Summary The Envoy RBAC (Role-Based Access Control) filter contains a logic vulnerability in how it validates HTTP headers when multiple values are present for the same header name. Instead of validating each header value individually, Envoy concatenates all values into a single comma-separated string. This be
ghsaosv
CVE-2026-26330MEDIUM≥ 1.36.0, ≤ 1.36.42026-03-10
CVE-2026-26330 [MEDIUM] CWE-416 Envoy's global rate limit may crash when the response phase limit is enabled and the response phase request is failed directly Envoy's global rate limit may crash when the response phase limit is enabled and the response phase request is failed directly ### Summary At the rate limit filter, if we enabled the response phase limit with `apply_on_stream_done` in the rate limit configuration and the response phase limit request fails directly, it may crash Envoy. #
ghsaosv
CVE-2026-26309MEDIUM≥ 1.36.0, ≤ 1.36.4≥ 1.35.0, ≤ 1.35.8+1 more2026-03-10
CVE-2026-26309 [MEDIUM] CWE-193 Envoy affected by off-by-one write in JsonEscaper::escapeString() Envoy affected by off-by-one write in JsonEscaper::escapeString() ### Summary An off-by-one write in Envoy::JsonEscaper::escapeString() can corrupt std::string null-termination, causing undefined behavior and potentially leading to crashes or out-of-bounds reads when the resulting string is later treated as a C-string. ### Details The bug is in the control-character escaping path in source/commo
ghsaosv
CVE-2026-26310MEDIUM≥ 1.36.0, ≤ 1.36.4≥ 1.35.0, ≤ 1.35.8+1 more2026-03-10
CVE-2026-26310 [MEDIUM] CWE-20 Envoy vulnerable to crash for scoped ip address during DNS Envoy vulnerable to crash for scoped ip address during DNS ### Summary Calling `Utility::getAddressWithPort` with a scoped IPv6 addresses causes a crash. This utility is called in the data plane from the original_src filter and the dns filter. ### Details The crashing function is `Utility::getAddressWithPort`. The crash occurs if a string containing a scoped IPv6 address is passed to this function. Thi
ghsaosv
CVE-2026-26311MEDIUM≥ 1.36.0, ≤ 1.36.4≥ 1.35.0, ≤ 1.35.8+1 more2026-03-10
CVE-2026-26311 [MEDIUM] CWE-416 Envoy: HTTP - filter chain execution on reset streams causing UAF crash Envoy: HTTP - filter chain execution on reset streams causing UAF crash **Note:** This vulnerability was originally reported to the Google OSS VRP (Issue ID: [477542544](https://issuetracker.google.com/issues/477542544)). The Google Security Team requested that I coordinate directly with the Envoy maintainers for triage and remediation. I am submitting this report here to facilitate that proc
ghsaosv
CVE-2025-66220MEDIUM≥ 1.36.0, < 1.36.3≥ 1.35.0, < 1.35.7+2 more2025-12-05
CVE-2025-66220 [MEDIUM] CWE-170 Envoy's TLS certificate matcher for `match_typed_subject_alt_names` may incorrectly treat certificates containing an embedded null byte Envoy's TLS certificate matcher for `match_typed_subject_alt_names` may incorrectly treat certificates containing an embedded null byte ### Summary Envoy’s mTLS certificate matcher for `match_typed_subject_alt_names` may incorrectly treat certificates containing an embedded null byte (\0) inside an `OTHERNAME` SAN value as valid
ghsaosv
CVE-2025-64527MEDIUM≥ 1.36.0, < 1.36.3≥ 1.35.0, < 1.35.7+2 more2025-12-05
CVE-2025-64527 [MEDIUM] CWE-476 Envoy crashes when JWT authentication is configured with the remote JWKS fetching Envoy crashes when JWT authentication is configured with the remote JWKS fetching ### Summary Envoy crashes when JWT authentication is configured with the remote JWKS fetching, `allow_missing_or_failed` is enabled, multiple JWT tokens are present in the request headers and the JWKS fetch fails. ### Details This is caused by a re-entry bug in the `JwksFetcherImpl`. When the first to
ghsaosv
CVE-2025-64763LOW≥ 1.36.0, < 1.36.3≥ 1.35.0, < 1.35.7+2 more2025-12-05
CVE-2025-64763 [LOW] CWE-693 Envoy forwards early CONNECT data in TCP proxy mode Envoy forwards early CONNECT data in TCP proxy mode ## Summary Forwarding of early CONNECT data in TCP proxy mode. ## Details Per [RFC 7231-4.3.6](https://www.rfc-editor.org/rfc/rfc7231#section-4.3.6) the sender of CONNECT (and all inbound proxies) switch to tunnel mode only after receiving 2xx response. However in TCP proxy mode, Envoy accepts client data before it has issued a 2xx response and eagerly proxies
ghsaosv
CVE-2025-54588HIGH≥ 1.35.0, < 1.35.1≥ 1.34.0, < 1.34.52025-09-15
CVE-2025-54588 [HIGH] CWE-416 Envoy: Race condition in Dynamic Forward Proxy leads to use-after-free and segmentation faults Envoy: Race condition in Dynamic Forward Proxy leads to use-after-free and segmentation faults ### Summary A use-after-free (UAF) vulnerability in Envoy's DNS cache causes abnormal process termination. Envoy may reallocate memory when processing a pending DNS resolution, causing list iterator to reference freed memory. ### Details The vulnerability exists in Envoy's Dy
ghsaosv
CVE-2025-30157MEDIUM≥ 0, < 1.30.10≥ 1.31.0, < 1.31.6+2 more2025-03-21
CVE-2025-30157 [MEDIUM] CWE-460 Envoy crashes when HTTP ext_proc processes local replies Envoy crashes when HTTP ext_proc processes local replies ### Summary Envoy's ext_proc HTTP filter is at risk of crashing if a local reply is sent to the external server due to the filter's life time issue. A known situation is the fail of a websocket handshake will trigger a local reply leading to the crash of Envoy. ### PoC If both websocket and ext_proc are enabled, a failed handshake will trigger a loca
ghsaosv
CVE-2019-9901CRITICAL≥ 0, < 1.9.12022-05-24
CVE-2019-9901 [CRITICAL] CWE-706 EnvoyProxy Envoy Missing HTTP URL path normalization EnvoyProxy Envoy Missing HTTP URL path normalization Envoy 1.9.0 and before does not normalize HTTP URL paths. A remote attacker may craft a relative path, e.g., `something/../admin`, to bypass access control, e.g., a block on `/admin`. A backend server could then interpret the non-normalized path and provide an attacker access beyond the scope provided for by the access control policy.
ghsaosv