CVE-2025-46821: CWE-186: Overly Restrictive Regular Expression in envoyproxy envoy
Envoy is a cloud-native edge/middle/service proxy. Prior to versions 1.34.1, 1.33.3, 1.32.6, and 1.31.8, Envoy's URI template matcher incorrectly excludes the `*` character from a set of valid characters in the URI path. As a result URI path containing the `*` character will not match a URI template expressions. This can result in bypass of RBAC rules when configured using the `uri_template` permissions. This vulnerability is fixed in Envoy versions v1.34.1, v1.33.3, v1.32.6, v1.31.8. As a workaround, configure additional RBAC permissions using `url_path` with `safe_regex` expression.
AI Analysis
Technical Summary
CVE-2025-46821 is a medium severity vulnerability affecting the Envoy proxy, a widely used cloud-native edge, middle, and service proxy. The vulnerability arises from an overly restrictive regular expression in Envoy's URI template matcher prior to versions 1.34.1, 1.33.3, 1.32.6, and 1.31.8. Specifically, the URI template matcher incorrectly excludes the asterisk (*) character from the set of valid characters in the URI path. This exclusion causes URI paths containing the '*' character to fail matching against URI template expressions. When Role-Based Access Control (RBAC) rules are configured using the 'uri_template' permissions, this flaw can be exploited to bypass those RBAC rules because requests with '*' in the URI path are not properly matched and thus not correctly authorized. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. The CVSS v3.1 base score is 5.3, reflecting a medium severity with network attack vector, low complexity, no privileges required, and no user interaction. The impact is limited to confidentiality as the bypass could allow unauthorized access to resources protected by RBAC policies. The vulnerability has no known exploits in the wild as of the published date. The recommended fix is to upgrade to one of the patched versions of Envoy (v1.34.1, v1.33.3, v1.32.6, or v1.31.8). As a workaround, administrators can configure additional RBAC permissions using 'url_path' with 'safe_regex' expressions to cover URI paths containing '*'. This vulnerability is categorized under CWE-186 (Incorrect Regular Expression).
Potential Impact
For European organizations, the impact of this vulnerability can be significant in environments where Envoy proxies are deployed to enforce fine-grained access control policies using RBAC with URI template matching. A successful bypass could allow unauthorized users or attackers to access sensitive internal services or data by crafting requests with '*' characters in the URI path, circumventing intended access restrictions. This could lead to unauthorized data exposure or access to internal APIs, potentially violating data protection regulations such as GDPR if personal or sensitive data is involved. The vulnerability does not directly affect integrity or availability but compromises confidentiality. Given Envoy's popularity in cloud-native and microservices architectures, especially in financial, telecommunications, and governmental sectors prevalent in Europe, the risk is non-trivial. However, the absence of known exploits in the wild and the medium CVSS score suggest that while the vulnerability is exploitable, it requires specific conditions and knowledge of the RBAC configuration to be effective.
Mitigation Recommendations
European organizations should prioritize upgrading Envoy proxies to the fixed versions: v1.34.1, v1.33.3, v1.32.6, or v1.31.8 as soon as possible to fully remediate the vulnerability. Until upgrades can be applied, administrators should implement the recommended workaround by configuring RBAC permissions using 'url_path' with 'safe_regex' expressions that explicitly allow or deny URI paths containing the '*' character, ensuring that access control policies cover these cases. It is also advisable to audit existing RBAC policies that use 'uri_template' permissions to identify potential gaps caused by this vulnerability. Monitoring and logging of unusual URI paths containing '*' should be enabled to detect potential exploitation attempts. Additionally, organizations should review their Envoy deployment architectures to ensure that proxies are not exposed unnecessarily to untrusted networks and that network segmentation and firewall rules limit access to Envoy management and data planes. Regular vulnerability scanning and penetration testing focusing on RBAC bypass scenarios can help identify residual risks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2025-46821: CWE-186: Overly Restrictive Regular Expression in envoyproxy envoy
Description
Envoy is a cloud-native edge/middle/service proxy. Prior to versions 1.34.1, 1.33.3, 1.32.6, and 1.31.8, Envoy's URI template matcher incorrectly excludes the `*` character from a set of valid characters in the URI path. As a result URI path containing the `*` character will not match a URI template expressions. This can result in bypass of RBAC rules when configured using the `uri_template` permissions. This vulnerability is fixed in Envoy versions v1.34.1, v1.33.3, v1.32.6, v1.31.8. As a workaround, configure additional RBAC permissions using `url_path` with `safe_regex` expression.
AI-Powered Analysis
Technical Analysis
CVE-2025-46821 is a medium severity vulnerability affecting the Envoy proxy, a widely used cloud-native edge, middle, and service proxy. The vulnerability arises from an overly restrictive regular expression in Envoy's URI template matcher prior to versions 1.34.1, 1.33.3, 1.32.6, and 1.31.8. Specifically, the URI template matcher incorrectly excludes the asterisk (*) character from the set of valid characters in the URI path. This exclusion causes URI paths containing the '*' character to fail matching against URI template expressions. When Role-Based Access Control (RBAC) rules are configured using the 'uri_template' permissions, this flaw can be exploited to bypass those RBAC rules because requests with '*' in the URI path are not properly matched and thus not correctly authorized. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. The CVSS v3.1 base score is 5.3, reflecting a medium severity with network attack vector, low complexity, no privileges required, and no user interaction. The impact is limited to confidentiality as the bypass could allow unauthorized access to resources protected by RBAC policies. The vulnerability has no known exploits in the wild as of the published date. The recommended fix is to upgrade to one of the patched versions of Envoy (v1.34.1, v1.33.3, v1.32.6, or v1.31.8). As a workaround, administrators can configure additional RBAC permissions using 'url_path' with 'safe_regex' expressions to cover URI paths containing '*'. This vulnerability is categorized under CWE-186 (Incorrect Regular Expression).
Potential Impact
For European organizations, the impact of this vulnerability can be significant in environments where Envoy proxies are deployed to enforce fine-grained access control policies using RBAC with URI template matching. A successful bypass could allow unauthorized users or attackers to access sensitive internal services or data by crafting requests with '*' characters in the URI path, circumventing intended access restrictions. This could lead to unauthorized data exposure or access to internal APIs, potentially violating data protection regulations such as GDPR if personal or sensitive data is involved. The vulnerability does not directly affect integrity or availability but compromises confidentiality. Given Envoy's popularity in cloud-native and microservices architectures, especially in financial, telecommunications, and governmental sectors prevalent in Europe, the risk is non-trivial. However, the absence of known exploits in the wild and the medium CVSS score suggest that while the vulnerability is exploitable, it requires specific conditions and knowledge of the RBAC configuration to be effective.
Mitigation Recommendations
European organizations should prioritize upgrading Envoy proxies to the fixed versions: v1.34.1, v1.33.3, v1.32.6, or v1.31.8 as soon as possible to fully remediate the vulnerability. Until upgrades can be applied, administrators should implement the recommended workaround by configuring RBAC permissions using 'url_path' with 'safe_regex' expressions that explicitly allow or deny URI paths containing the '*' character, ensuring that access control policies cover these cases. It is also advisable to audit existing RBAC policies that use 'uri_template' permissions to identify potential gaps caused by this vulnerability. Monitoring and logging of unusual URI paths containing '*' should be enabled to detect potential exploitation attempts. Additionally, organizations should review their Envoy deployment architectures to ensure that proxies are not exposed unnecessarily to untrusted networks and that network segmentation and firewall rules limit access to Envoy management and data planes. Regular vulnerability scanning and penetration testing focusing on RBAC bypass scenarios can help identify residual risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-30T19:41:58.134Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9819c4522896dcbd8599
Added to database: 5/21/2025, 9:08:41 AM
Last enriched: 7/5/2025, 6:54:31 AM
Last updated: 8/16/2025, 4:37:42 AM
Views: 9
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.