Home

Description

Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, the Envoy RBAC (Role-Based Access Control) filter contains a logic vulnerability in how it validates HTTP headers when multiple values are present for the same header name. Instead of validating each header value individually, Envoy concatenates all values into a single comma-separated string. This behavior allows attackers to bypass RBAC policies—specifically "Deny" rules—by sending duplicate headers, effectively obscuring the malicious value from exact-match mechanisms. This vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13.

PUBLISHED Reserved 2026-02-13 | Published 2026-03-10 | Updated 2026-03-10 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N

Problem types

CWE-863: Incorrect Authorization

Product status

>= 1.37.0, < 1.37.1
affected

>= 1.36.0, < 1.36.5
affected

>= 1.35.0, < 1.35.9
affected

< 1.34.13
affected

References

github.com/.../envoy/security/advisories/GHSA-ghc4-35x6-crw5

github.com/...ommit/b6ba0b2294b98484fb0ed8556897d1073cc27867

cve.org (CVE-2026-26308)

nvd.nist.gov (CVE-2026-26308)

Download JSON