Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2026-26308

Envoy has RBAC Header Validation Bypass via Multi-Value Header Concatenation
Back to all
CVE

CVE-2026-26308

Envoy has RBAC Header Validation Bypass via Multi-Value Header Concatenation

1. Summary

The Envoy RBAC (Role-Based Access Control) filter contains a logic vulnerability in how it validates HTTP headers when multiple values are present for the same header name. Instead of validating each header value individually, Envoy concatenates all values into a single comma-separated string. This behavior allows attackers to bypass RBAC policies—specifically "Deny" rules—by sending duplicate headers, effectively obscuring the malicious value from exact-match mechanisms.

2. Attack Scenario

Consider an environment where an administrator wants to block external access to internal resources using a specific header flag.

Configuration

The Envoy proxy is configured with a Deny rule to reject requests containing the header internal: true.

  • Rule Type: Exact Match
  • Target: internal header must not equal true.

The Bypass Logic

  1.  Standard Request (Blocked):
    • Input: internal: true
    • Envoy Processing: Sees string "true".
    • Result: Match found. Request Denied.
  2.  Exploit Request (Bypassed):
    • Input:

        ```http

        internal: true

        internal: true

        ```

    • Envoy Processing: Concatenates values into "true,true".
    • Matcher Evaluation: Does "true,true" equal "true"No.
    • Result: The Deny rule fails to trigger. Request Allowed.

3. Implications

  • RBAC Bypass: Remote attackers can bypass configured access controls.
  • Unauthorized Access: Sensitive internal resources or administrative endpoints protected by header-based Deny rules become accessible.
  • Risk: High, particularly for deployments relying on "Exact Match" strategies for security blocking.

4. Reproduction Steps

To verify this vulnerability:

  1.  Deploy Envoy: Configure an instance with an RBAC Deny rule that performs an exact match on a specific header (e.g., internal: true).
  2.  Baseline Test: Send a request containing the header internal: true.
    • Observation: Envoy blocks this request (HTTP 403).
  3.  Exploit Test: Send a second request containing the same header twice:

    ```http

    GET /restricted-resource HTTP/1.1

    Host: example.com

    internal: true

    internal: true

    ```

    • Observation: Envoy allows the request, granting access to the resource.

6. Recommendations

Fix Header Validation Logic:

Modify the RBAC filter to validate each header value instance individually. Avoid relying on the concatenated string output of getAllOfHeaderAsString() for security-critical matching unless the matcher is explicitly designed to parse comma-separated lists.

** Examine the DENY role to use a Regex style fix.

Credit: Dor Konis

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
7.5
-
3.1
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N
C
H
U
0
-
3.1
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N
C
H
U
7.5
-
3.1
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N

Related Resources

No items found.

References

https://github.com/envoyproxy/envoy/security/advisories/GHSA-ghc4-35x6-crw5, https://nvd.nist.gov/vuln/detail/CVE-2026-26308, https://github.com/envoyproxy/envoy/commit/b6ba0b2294b98484fb0ed8556897d1073cc27867, https://github.com/envoyproxy/envoy

Severity

7.5

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
7.5
EPSS Probability
0.00003%
EPSS Percentile
0.00122%
Introduced Version
1.37.0,v1.37.0,v1.36.0,v1.35.0,v1.7.0,v0.0.0-20180528224711-d519097e9d0f
Fix Available
1.37.1,v1.37.1,v1.36.5,v1.35.9,v1.34.13,v0.0.0-20260310171747-b6ba0b2294b9

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading