Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32811: CWE-116: Improper Encoding or Escaping of Output in dadrus heimdall

0
High
VulnerabilityCVE-2026-32811cvecve-2026-32811cwe-116cwe-863
Published: Fri Mar 20 2026 (03/20/2026, 01:52:08 UTC)
Source: CVE Database V5
Vendor/Project: dadrus
Product: heimdall

Description

Heimdall is a cloud native Identity Aware Proxy and Access Control Decision service. When using Heimdall in envoy gRPC decision API mode with versions 0.7.0-alpha through 0.17.10, wrong encoding of the query URL string allows rules with non-wildcard path expressions to be bypassed. Envoy splits the requested URL into parts, and sends the parts individually to Heimdall. Although query and path are present in the API, the query field is documented to be always empty and the URL query is included in the path field. The implementation uses go's url library to reconstruct the url which automatically encodes special characters in the path. As a consequence, a parameter like /mypath?foo=bar to Path is escaped into /mypath%3Ffoo=bar. Subsequently, a rule matching /mypath no longer matches and is bypassed. The issue can only lead to unintended access if Heimdall is configured with an "allow all" default rule. Since v0.16.0, Heimdall enforces secure defaults and refuses to start with such a configuration unless this enforcement is explicitly disabled, e.g. via --insecure-skip-secure-default-rule-enforcement or the broader --insecure flag. This issue has been fixed in version 0.17.11.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 19:30:02 UTC

Technical Analysis

Heimdall is a cloud-native Identity Aware Proxy and Access Control Decision service that integrates with Envoy via a gRPC decision API. In versions 0.7.0-alpha through 0.17.10, Heimdall mishandles URL query strings when operating in Envoy gRPC decision API mode. Envoy splits the requested URL into components and sends them separately to Heimdall, where the query field is documented as always empty and the full URL query is included in the path field. Heimdall uses Go's standard url library to reconstruct the URL, which automatically percent-encodes special characters in the path segment. For example, a URL path like /mypath?foo=bar is encoded as /mypath%3Ffoo=bar. This encoding causes path-based access control rules that expect /mypath to fail to match, effectively bypassing those rules. The vulnerability can lead to unauthorized access if Heimdall is configured with an "allow all" default rule, which is insecure. Since version 0.16.0, Heimdall enforces secure defaults by refusing to start with such a configuration unless explicitly overridden via flags like --insecure-skip-secure-default-rule-enforcement or --insecure. The issue was addressed and fixed in version 0.17.11. The CVSS v3.1 score is 8.2 (high), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and impacts on confidentiality and integrity but not availability. No known exploits are currently reported in the wild.

Potential Impact

This vulnerability can allow attackers to bypass path-based access control rules in Heimdall, potentially granting unauthorized access to protected resources. The impact primarily affects confidentiality and integrity of access control decisions, as unauthorized users may gain access to sensitive services or data. Availability is not impacted. The risk is significant in environments where Heimdall is deployed as a critical identity-aware proxy controlling access to cloud-native applications and services. Organizations using vulnerable versions with insecure default configurations are at higher risk. Exploitation requires no authentication or user interaction and can be performed remotely over the network, increasing the threat surface. However, secure default configurations in recent versions mitigate the risk unless explicitly disabled. Failure to patch or properly configure Heimdall could lead to unauthorized data exposure, privilege escalation, and potential lateral movement within enterprise networks.

Mitigation Recommendations

1. Upgrade Heimdall to version 0.17.11 or later to apply the official fix for this vulnerability. 2. Avoid using insecure default configurations; do not disable secure default rule enforcement unless absolutely necessary and fully understood. 3. Review and audit all access control rules to ensure they do not rely solely on path matching that could be bypassed by URL encoding issues. 4. Implement additional layers of access control and monitoring around Heimdall to detect anomalous access patterns. 5. Use network segmentation and zero trust principles to limit the impact of any potential bypass. 6. Regularly update and patch Heimdall and related components to incorporate security improvements. 7. Conduct penetration testing and vulnerability assessments focusing on URL encoding and access control logic. 8. Monitor Heimdall logs for unusual requests that include encoded query strings in paths. 9. Educate DevOps and security teams about the risks of disabling secure defaults and the importance of proper URL handling in access control.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-16T17:35:36.696Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bcafd6e32a4fbe5f174c28

Added to database: 3/20/2026, 2:24:22 AM

Last enriched: 3/27/2026, 7:30:02 PM

Last updated: 5/3/2026, 9:42:57 PM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses