Description
Contour is a Kubernetes ingress controller using Envoy proxy. From v1.19.0 to before v1.33.4, v1.32.5, and v1.31.6, Contour's Cookie Rewriting feature is vulnerable to Lua code injection. An attacker with RBAC permissions to create or modify HTTPProxy resources can craft a malicious value in spec.routes[].cookieRewritePolicies[].pathRewrite.value or spec.routes[].services[].cookieRewritePolicies[].pathRewrite.value that results in arbitrary code execution in the Envoy proxy. The cookie rewriting feature is internally implemented using Envoy's HTTP Lua filter. User-controlled values are interpolated into Lua source code using Go text/template without sufficient sanitization. The injected code only executes when processing traffic on the attacker's own route, which they already control. However, since Envoy runs as shared infrastructure, the injected code can also read Envoy's xDS client credentials from the filesystem or cause denial of service for other tenants sharing the Envoy instance. This vulnerability is fixed in v1.33.4, v1.32.5, and v1.31.6.
Published: 2026-04-23
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the Cookie Rewriting feature of Contour, a Kubernetes ingress controller that utilizes Envoy's HTTP Lua filter. When an attacker with permission to create or modify HTTPProxy resources crafts a malicious value in the cookieRewritePolicies.pathRewrite.value field, the value is interpolated into Lua code without proper sanitization. This enables arbitrary Lua code execution within the Envoy proxy, allowing the attacker to read Envoy's xDS client credentials or cause a denial of service. The injected code runs only when traffic is processed on the attacker’s own route, but because Envoy operates as shared infrastructure, the malicious script can affect other tenants as well.

Affected Systems

Versions of Contour from 1.19.0 up to but excluding 1.33.4, 1.32.5, and 1.31.6 are impacted. The bug is fixed in Contour releases 1.33.4, 1.32.5, and 1.31.6; any deployment using earlier releases should be evaluated for upgrade eligibility.

Risk and Exploitability

The CVSS score of 8.1 indicates high severity, while the EPSS score indicates very low probability of exploitation in the wild. The vulnerability is not listed in CISA's KEV catalog. Exploitation requires RBAC permissions to create or modify HTTPProxy resources, so an attacker must either have legitimate cluster privileges or compromise a user with those rights. Once the malicious route is defined, the injected Lua code is executed during traffic handling and can exfiltrate credentials or crash Envoy, potentially impacting multiple tenants that share the same Envoy instance.

Generated by OpenCVE AI on April 28, 2026 at 07:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Contour to v1.33.4, v1.32.5, or v1.31.6 or newer to remove the vulnerability.
  • Limit RBAC permissions so that only trusted administrators can create or modify HTTPProxy resources; consider removing modify permissions from untrusted users.
  • If upgrading immediately is infeasible, disable the Cookie Rewriting feature or enforce strict validation on the cookieRewritePolicies.pathRewrite.value field to prevent injection.
  • Monitor Envoy logs for unexpected Lua script execution or credential access and audit HTTPProxy objects for recent changes.

Generated by OpenCVE AI on April 28, 2026 at 07:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-x4mj-7f9g-29h4 Contour has Lua code injection via Cookie Path Rewrite Policy
History

Tue, 28 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:projectcontour:contour:*:*:*:*:*:kubernetes:*:*

Mon, 27 Apr 2026 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Projectcontour
Projectcontour contour
Vendors & Products Projectcontour
Projectcontour contour

Sat, 25 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Fri, 24 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Description Contour is a Kubernetes ingress controller using Envoy proxy. From v1.19.0 to before v1.33.4, v1.32.5, and v1.31.6, Contour's Cookie Rewriting feature is vulnerable to Lua code injection. An attacker with RBAC permissions to create or modify HTTPProxy resources can craft a malicious value in spec.routes[].cookieRewritePolicies[].pathRewrite.value or spec.routes[].services[].cookieRewritePolicies[].pathRewrite.value that results in arbitrary code execution in the Envoy proxy. The cookie rewriting feature is internally implemented using Envoy's HTTP Lua filter. User-controlled values are interpolated into Lua source code using Go text/template without sufficient sanitization. The injected code only executes when processing traffic on the attacker's own route, which they already control. However, since Envoy runs as shared infrastructure, the injected code can also read Envoy's xDS client credentials from the filesystem or cause denial of service for other tenants sharing the Envoy instance. This vulnerability is fixed in v1.33.4, v1.32.5, and v1.31.6.
Title Contour: Lua code injection via Cookie Path Rewrite Policy
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}


Subscriptions

Projectcontour Contour
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-24T18:20:40.823Z

Reserved: 2026-04-18T03:47:03.135Z

Link: CVE-2026-41246

cve-icon Vulnrichment

Updated: 2026-04-24T14:15:54.593Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-23T19:17:29.670

Modified: 2026-04-28T19:04:03.063

Link: CVE-2026-41246

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-23T18:44:39Z

Links: CVE-2026-41246 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T07:45:26Z

Weaknesses