CVE-2026-26308

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
10/03/2026
Last modified:
11/03/2026

Description

Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, the Envoy RBAC (Role-Based Access Control) filter contains a logic vulnerability in how it validates HTTP headers when multiple values are present for the same header name. Instead of validating each header value individually, Envoy concatenates all values into a single comma-separated string. This behavior allows attackers to bypass RBAC policies—specifically "Deny" rules—by sending duplicate headers, effectively obscuring the malicious value from exact-match mechanisms. This vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* 1.34.13 (excluding)
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* 1.35.0 (including) 1.35.8 (excluding)
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* 1.36.0 (including) 1.36.5 (excluding)
cpe:2.3:a:envoyproxy:envoy:1.37.0:*:*:*:*:*:*:*