CVE-2026-26330
- EPSS 0%
- Veröffentlicht 10.03.2026 19:19:52
- Zuletzt bearbeitet 11.03.2026 15:57:32
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, At the rate limit filter, if the response phase limit with apply_on_stream_done in the rate limit configuration is enabled and the response phase lim...
CVE-2026-26311
- EPSS 0.01%
- Veröffentlicht 10.03.2026 19:14:41
- Zuletzt bearbeitet 11.03.2026 16:03:58
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, a logic vulnerability in Envoy's HTTP connection manager (FilterManager) that allows for Zombie Stream Filter Execution. This issue creates a "Use-Af...
CVE-2026-26310
- EPSS 0.01%
- Veröffentlicht 10.03.2026 19:08:22
- Zuletzt bearbeitet 11.03.2026 16:09:31
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, calling Utility::getAddressWithPort with a scoped IPv6 addresses causes a crash. This utility is called in the data plane from the original_src filte...
CVE-2026-26309
- EPSS 0%
- Veröffentlicht 10.03.2026 19:04:21
- Zuletzt bearbeitet 11.03.2026 16:14:20
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, an off-by-one write in Envoy::JsonEscaper::escapeString() can corrupt std::string null-termination, causing undefined behavior and potentially leadin...
CVE-2026-26308
- EPSS 0%
- Veröffentlicht 10.03.2026 19:01:28
- Zuletzt bearbeitet 11.03.2026 16:23:23
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, the Envoy RBAC (Role-Based Access Control) filter contains a logic vulnerability in how it validates HTTP headers when multiple values are present fo...
CVE-2025-66220
- EPSS 0%
- Veröffentlicht 03.12.2025 18:31:50
- Zuletzt bearbeitet 05.12.2025 15:44:26
Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, Envoy’s mTLS certificate matcher for match_typed_subject_alt_names may incorrectly treat certificates containing an embedded null byte (\0) insid...
CVE-2025-64763
- EPSS 0%
- Veröffentlicht 03.12.2025 18:15:47
- Zuletzt bearbeitet 05.12.2025 16:52:24
Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, when Envoy is configured in TCP proxy mode to handle CONNECT requests, it accepts client data before issuing a 2xx response and forwards that dat...
CVE-2025-64527
- EPSS 0%
- Veröffentlicht 03.12.2025 18:15:46
- Zuletzt bearbeitet 05.12.2025 16:56:40
Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, Envoy crashes when JWT authentication is configured with the remote JWKS fetching, allow_missing_or_failed is enabled, multiple JWT tokens are pr...
CVE-2025-62504
- EPSS 0.02%
- Veröffentlicht 16.10.2025 21:23:41
- Zuletzt bearbeitet 29.10.2025 19:19:16
Envoy is an open source edge and service proxy. Envoy versions earlier than 1.36.2, 1.35.6, 1.34.10, and 1.33.12 contain a use-after-free vulnerability in the Lua filter. When a Lua script executing in the response phase rewrites a response body so t...
CVE-2025-62409
- EPSS 0.01%
- Veröffentlicht 16.10.2025 17:47:25
- Zuletzt bearbeitet 29.10.2025 19:55:48
Envoy is a cloud-native, open source edge and service proxy. Prior to 1.36.1, 1.35.5, 1.34.9, and 1.33.10, large requests and responses can potentially trigger TCP connection pool crashes due to flow control management in Envoy. It will happen when t...