We found results for “”
CVE-2025-46821
Good to know:
Date: May 7, 2025
Envoy is a cloud-native edge/middle/service proxy. Prior to versions 1.34.1, 1.33.3, 1.32.6, and 1.31.8, Envoy's URI template matcher incorrectly excludes the "*" character from a set of valid characters in the URI path. As a result URI path containing the "*" character will not match a URI template expressions. This can result in bypass of RBAC rules when configured using the "uri_template" permissions. This vulnerability is fixed in Envoy versions v1.34.1, v1.33.3, v1.32.6, v1.31.8. As a workaround, configure additional RBAC permissions using "url_path" with "safe_regex" expression.
Severity Score
Severity Score
Weakness Type (CWE)
Overly Restrictive Regular Expression
CWE-186Top Fix
Upgrade Version
Upgrade to version https://github.com/envoyproxy/envoy.git - v1.31.8;https://github.com/envoyproxy/envoy.git - v1.32.6;https://github.com/envoyproxy/envoy.git - v1.33.3;https://github.com/envoyproxy/envoy.git - v1.34.1
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | LOW |
| Integrity (I): | NONE |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


