Home

Description

Envoy is an open source edge and service proxy. Envoy versions earlier than 1.36.2, 1.35.6, 1.34.10, and 1.33.12 contain a use-after-free vulnerability in the Lua filter. When a Lua script executing in the response phase rewrites a response body so that its size exceeds the configured per_connection_buffer_limit_bytes (default 1MB), Envoy generates a local reply whose headers override the original response headers, leaving dangling references and causing a crash. This results in denial of service. Updating to versions 1.36.2, 1.35.6, 1.34.10, or 1.33.12 fixes the issue. Increasing per_connection_buffer_limit_bytes (and for HTTP/2 the initial_stream_window_size) or increasing per_request_buffer_limit_bytes / request_body_buffer_limit can reduce the likelihood of triggering the condition but does not correct the underlying memory safety flaw.

PUBLISHED Reserved 2025-10-15 | Published 2025-10-16 | Updated 2025-10-17 | Assigner GitHub_M




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-416: Use After Free

Product status

>= 1.36.0, <= 1.36.1
affected

>= 1.350, <= 1.35.5
affected

>= 1.34.0, <= 1.34.9
affected

<= 1.33.11
affected

References

github.com/.../envoy/security/advisories/GHSA-gcxr-6vrp-wff3

cve.org (CVE-2025-62504)

nvd.nist.gov (CVE-2025-62504)

Download JSON