Skip to content

x/vulndb: potential Go vuln in github.com/envoyproxy/envoy: CVE-2025-46821 #3673

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
GoVulnBot opened this issue May 7, 2025 · 0 comments

Comments

@GoVulnBot
Copy link

Advisory CVE-2025-46821 references a vulnerability in the following Go modules:

Module
github.com/envoyproxy/envoy

Description:
Envoy is a cloud-native edge/middle/service proxy. Prior to versions 1.34.1, 1.33.3, 1.32.6, and 1.31.8, Envoy's URI template matcher incorrectly excludes the * character from a set of valid characters in the URI path. As a result URI path containing the * character will not match a URI template expressions. This can result in bypass of RBAC rules when configured using the uri_template permissions. This vulnerability is fixed in Envoy versions v1.34.1, v1.33.3, v1.32.6, v1.31.8. As a workaround, configure additional RBAC permissions using url_path with safe_regex expression.

References:

Cross references:

See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/envoyproxy/envoy
      vulnerable_at: 1.34.1
summary: CVE-2025-46821 in github.com/envoyproxy/envoy
cves:
    - CVE-2025-46821
references:
    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2025-46821
    - web: https://github.com/envoyproxy/envoy/security/advisories/GHSA-c7cm-838g-6g67
source:
    id: CVE-2025-46821
    created: 2025-05-07T23:01:21.653588549Z
review_status: UNREVIEWED

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants