Impact
The Envoy RBAC filter contains a logic flaw in which it concatenates all header values with the same name into a single comma‑separated string rather than validating each value separately. This allows an attacker to send duplicate headers that conceal disallowed values from exact‑match checks, thereby bypassing “Deny” rules and granting unauthorized access to protected resources.
Affected Systems
The vulnerability affects EnvoyProxy version 1.37.0 and earlier, specifically 1.37.0, 1.36.4, 1.35.7, and 1.34.12, until the fixes delivered in 1.37.1, 1.36.5, 1.35.8, and 1.34.13. Any environment running those versions of the Envoy® proxy is potentially exposed.
Risk and Exploitability
With a CVSS score of 7.5 the flaw has a moderate‑high impact, yet the EPSS score is less than 1 % and it is not currently listed in the CISA KEV catalog, indicating a low likelihood of widespread exploitation. The attack vector is an HTTP client that can supply duplicate header values; an attacker could therefore craft requests that evade RBAC policies from any network path that reaches the Envoy instance.
OpenCVE Enrichment
Github GHSA