CVE Vulnerabilities

CVE-2025-46821

Overly Restrictive Regular Expression

Published: May 07, 2025 | Modified: Sep 03, 2025
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

Envoy is a cloud-native edge/middle/service proxy. Prior to versions 1.34.1, 1.33.3, 1.32.6, and 1.31.8, Envoys URI template matcher incorrectly excludes the * character from a set of valid characters in the URI path. As a result URI path containing the * character will not match a URI template expressions. This can result in bypass of RBAC rules when configured using the uri_template permissions. This vulnerability is fixed in Envoy versions v1.34.1, v1.33.3, v1.32.6, v1.31.8. As a workaround, configure additional RBAC permissions using url_path with safe_regex expression.

Weakness

A regular expression is overly restrictive, which prevents dangerous values from being detected.

Affected Software

Name Vendor Start Version End Version
Envoy Envoyproxy * 1.31.8 (excluding)
Envoy Envoyproxy 1.32.0 (including) 1.32.6 (excluding)
Envoy Envoyproxy 1.33.0 (including) 1.33.3 (excluding)
Envoy Envoyproxy 1.34.0 (including) 1.34.0 (including)

Potential Mitigations

References