Envoy is a cloud-native edge/middle/service proxy. Prior to versions 1.34.1, 1.33.3, 1.32.6, and 1.31.8, Envoy's URI template matcher incorrectly excludes the `*` character from a set of valid characters in the URI path. As a result URI path containing the `*` character will not match a URI template expressions. This can result in bypass of RBAC rules when configured using the `uri_template` permissions. This vulnerability is fixed in Envoy versions v1.34.1, v1.33.3, v1.32.6, v1.31.8. As a workaround, configure additional RBAC permissions using `url_path` with `safe_regex` expression.
Metrics
Affected Vendors & Products
References
History
Thu, 08 May 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 07 May 2025 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Envoy is a cloud-native edge/middle/service proxy. Prior to versions 1.34.1, 1.33.3, 1.32.6, and 1.31.8, Envoy's URI template matcher incorrectly excludes the `*` character from a set of valid characters in the URI path. As a result URI path containing the `*` character will not match a URI template expressions. This can result in bypass of RBAC rules when configured using the `uri_template` permissions. This vulnerability is fixed in Envoy versions v1.34.1, v1.33.3, v1.32.6, v1.31.8. As a workaround, configure additional RBAC permissions using `url_path` with `safe_regex` expression. | |
Title | Envoy vulnerable to bypass of RBAC uri_template permission | |
Weaknesses | CWE-186 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-05-07T21:24:07.891Z
Updated: 2025-05-08T14:11:13.676Z
Reserved: 2025-04-30T19:41:58.134Z
Link: CVE-2025-46821

Updated: 2025-05-08T14:11:01.099Z

Status : Awaiting Analysis
Published: 2025-05-07T22:15:21.170
Modified: 2025-05-08T14:39:09.683
Link: CVE-2025-46821

No data.