CVE-2026-41491
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
08/05/2026
Last modified:
12/05/2026
Description
Dapr is a portable, event-driven, runtime for building distributed applications across cloud and edge. From versions 1.3.0 to before 1.15.14, 1.16.0-rc.1 to before 1.16.14, and 1.17.0-rc.1 to before 1.17.5, a vulnerability has been found in Dapr that allows bypassing access control policies for service invocation using reserved URL characters and path traversal sequences in method paths. The ACL normalized the method path independently from the dispatch layer, so the ACL evaluated one path while the target application received a different one. This issue has been patched in versions 1.15.14, 1.16.14, and 1.17.5.
Impact
Base Score 3.x
8.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:linuxfoundation:dapr:*:*:*:*:*:*:*:* | 1.3.0 (including) | 1.15.14 (excluding) |
| cpe:2.3:a:linuxfoundation:dapr:*:*:*:*:*:*:*:* | 1.16.0 (including) | 1.16.14 (excluding) |
| cpe:2.3:a:linuxfoundation:dapr:*:*:*:*:*:*:*:* | 1.17.0 (including) | 1.17.5 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



