Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.2
Envoy Proxy: Malicious Headers Can Bypass Security Rules
GHSA-ghc4-35x6-crw5
CVE-2026-26308
GHSA-ghc4-35x6-crw5
Summary
If you're using an older version of Envoy, attackers could send multiple headers to trick the system into allowing access. This could let them bypass security rules that are meant to restrict access to certain areas of your network. Update to Envoy 1.37.1, 1.36.5, 1.35.8, or 1.34.13 to fix this issue.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| envoyproxy | envoy | <= 1.34.13 | – |
| envoyproxy | envoy | > 1.35.0 , <= 1.35.8 | – |
| envoyproxy | envoy | > 1.36.0 , <= 1.36.5 | – |
| envoyproxy | envoy | 1.37.0 | – |
| github.com | envoyproxy | 1.37.0 | – |
| github.com | envoyproxy | > 1.36.0 , <= 1.36.4 | – |
| github.com | envoyproxy | > 1.35.0 , <= 1.35.8 | – |
| github.com | envoyproxy | <= 1.34.12 | – |
| envoyproxy | github.com/envoyproxy/envoy | All versions | – |
| envoyproxy | github.com/envoyproxy/envoy | > 1.36.0 , <= 1.36.4 | – |
| envoyproxy | github.com/envoyproxy/envoy | > 1.35.0 , <= 1.35.8 | – |
| envoyproxy | github.com/envoyproxy/envoy | <= 1.34.12 | – |
Original title
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, the Envoy RBAC (Role-Based Access Control) filter contains a logic vulnerability in how it valid...
Original description
Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, the Envoy RBAC (Role-Based Access Control) filter contains a logic vulnerability in how it validates HTTP headers when multiple values are present for the same header name. Instead of validating each header value individually, Envoy concatenates all values into a single comma-separated string. This behavior allows attackers to bypass RBAC policies—specifically "Deny" rules—by sending duplicate headers, effectively obscuring the malicious value from exact-match mechanisms. This vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13.
ghsa CVSS3.1
7.5
Vulnerability type
CWE-20
Improper Input Validation
CWE-863
Incorrect Authorization
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-ghc4-35x6-crw5
- https://github.com/advisories/GHSA-ghc4-35x6-crw5
- https://github.com/envoyproxy/envoy Product
- https://github.com/envoyproxy/envoy/commit/b6ba0b2294b98484fb0ed8556897d1073cc27...
- https://nvd.nist.gov/vuln/detail/CVE-2026-26308
Published: 10 Mar 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026