CVE-2026-26205

N/A Unknown

📋 TL;DR

This vulnerability in opa-envoy-plugin allows attackers to bypass authorization policies by crafting HTTP requests with double-slash prefixes in paths. The plugin incorrectly interprets these as authority components, creating a mismatch between what authorization policies evaluate and what backend servers process. Organizations using opa-envoy-plugin versions before 1.13.2-envoy-2 for Envoy-based authorization are affected.

💻 Affected Systems

Products:
  • opa-envoy-plugin
Versions: All versions prior to 1.13.2-envoy-2
Operating Systems: All operating systems running Envoy with opa-envoy-plugin
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments using opa-envoy-plugin for authorization with Envoy. The vulnerability exists in the path parsing logic regardless of specific policy configurations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete authorization bypass enabling unauthorized access to protected resources, potentially exposing sensitive data or allowing privilege escalation.

🟠

Likely Case

Selective authorization bypass for specific endpoints where attackers can craft paths with double-slash prefixes to evade policy enforcement.

🟢

If Mitigated

Limited impact with proper network segmentation and additional authorization layers, though the primary policy enforcement mechanism remains compromised.

🌐 Internet-Facing: HIGH - Internet-facing Envoy proxies using vulnerable opa-envoy-plugin versions are directly exploitable by external attackers.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable to insider threats or compromised internal accounts, though attack surface is reduced.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP request crafting with double-slash path prefixes. No authentication or special privileges needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.13.2-envoy-2

Vendor Advisory: https://github.com/open-policy-agent/opa-envoy-plugin/security/advisories/GHSA-9f29-v6mm-pw6w

Restart Required: Yes

Instructions:

1. Update opa-envoy-plugin to version 1.13.2-envoy-2 or later. 2. Update plugin configuration if needed. 3. Restart Envoy proxy instances. 4. Verify the fix by testing with previously exploitable paths.

🔧 Temporary Workarounds

WAF Rule for Double-Slash Paths

all

Configure web application firewall to block or alert on HTTP requests containing double-slash sequences in paths.

# Example nginx rule: location ~* "//" { return 403; }
# Example Apache rule: RewriteRule .*//.* - [F]

Envoy Path Normalization

all

Configure Envoy to normalize paths before they reach opa-envoy-plugin, removing double-slash sequences.

# In Envoy configuration, add path normalization filters before the ext_authz filter

🧯 If You Can't Patch

  • Implement additional authorization layer at backend application level
  • Deploy network segmentation to limit access to protected resources

🔍 How to Verify

Check if Vulnerable:

Check opa-envoy-plugin version and test with crafted HTTP requests containing paths like /api//protected/resource

Check Version:

Check Envoy configuration or plugin logs for opa-envoy-plugin version string

Verify Fix Applied:

After patching, test with same crafted requests; authorization should now properly evaluate the full path.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with double-slash sequences in paths
  • Authorization failures followed by successful resource access

Network Indicators:

  • Unusual pattern of requests to protected endpoints with modified path structures

SIEM Query:

http.path CONTAINS "//" AND http.status_code = 200 AND auth.result = "denied"

🔗 References

📤 Share & Export