Dapr is a portable, event-driven, runtime for building distributed applications across cloud and edge. From versions 1.3.0 to before 1.15.14, 1.16.0-rc.1 to before 1.16.14, and 1.17.0-rc.1 to before 1.17.5, a vulnerability has been found in Dapr that allows bypassing access control policies for service invocation using reserved URL characters and path traversal sequences in method paths. The ACL normalized the method path independently from the dispatch layer, so the ACL evaluated one path while the target application received a different one. This issue has been patched in versions 1.15.14, 1.16.14, and 1.17.5.
History

Tue, 12 May 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Linuxfoundation
Linuxfoundation dapr
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:linuxfoundation:dapr:*:*:*:*:*:*:*:*
Vendors & Products Linuxfoundation
Linuxfoundation dapr

Fri, 08 May 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Dapr
Dapr dapr
Vendors & Products Dapr
Dapr dapr

Fri, 08 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 08 May 2026 13:30:00 +0000

Type Values Removed Values Added
Description Dapr is a portable, event-driven, runtime for building distributed applications across cloud and edge. From versions 1.3.0 to before 1.15.14, 1.16.0-rc.1 to before 1.16.14, and 1.17.0-rc.1 to before 1.17.5, a vulnerability has been found in Dapr that allows bypassing access control policies for service invocation using reserved URL characters and path traversal sequences in method paths. The ACL normalized the method path independently from the dispatch layer, so the ACL evaluated one path while the target application received a different one. This issue has been patched in versions 1.15.14, 1.16.14, and 1.17.5.
Title Dapr: Service Invocation path traversal ACL bypass
Weaknesses CWE-22
CWE-284
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-05-08T13:11:13.128Z

Updated: 2026-05-08T13:58:57.832Z

Reserved: 2026-04-20T16:14:19.008Z

Link: CVE-2026-41491

cve-icon Vulnrichment

Updated: 2026-05-08T13:58:54.199Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-08T14:16:33.407

Modified: 2026-05-12T14:47:26.923

Link: CVE-2026-41491

cve-icon Redhat

No data.