Description
Istio is an open platform to connect, manage, and secure microservices. Prior to versions 1.28.6 and 1.29.2, when a RequestAuthentication resource is created with a jwksUri pointing to an internal service, istiod makes an unauthenticated HTTP GET request to that URL without filtering out localhost or link local ips. This can result in sensitive data being distributed to Envoy proxies via xDS configuration. This issue has been patched in versions 1.28.6 and 1.29.2.
Published: 2026-05-07
Score: 5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability in Istio allows the istio control plane to perform an unauthenticated HTTP GET request to a jwksUri specified in a RequestAuthentication resource. This request is made without filtering out localhost or link‑local addresses, causing the internal service to return data that is then distributed to Envoy proxies via the xDS configuration. As a result, sensitive internal information may be exposed to unauthorized parties. The weakness is a classic SSRF flaw (CWE‑918).

Affected Systems

Systems running Istio prior to the 1.28.6 or 1.29.2 releases are affected, including any deployment that creates RequestAuthentication resources with a jwksUri pointing to an internal service.

Risk and Exploitability

The CVSS score of 5 indicates a moderate severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector involves an attacker creating or modifying a RequestAuthentication resource to specify a malicious jwksUri. The attacker must have cluster‑level or privileged access to instantiate the malicious jwksUri and read internal data. The lack of external filtering allows the request to reach the internal service unimpeded, turning the data exposure into a potential breach of confidentiality for cluster developers and operators.

Generated by OpenCVE AI on May 7, 2026 at 07:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Istio to version 1.28.6 or later, or to 1.29.2 or later, where the SSRF issue has been fixed.
  • Modify or remove RequestAuthentication resources that reference internal jwksUri endpoints, or constrain the jwksUri to publicly reachable endpoints that do not expose sensitive data.
  • After updating Istio and adjusting configurations, review the Envoy xDS configuration to confirm that no unintended internal data is being distributed to proxies.

Generated by OpenCVE AI on May 7, 2026 at 07:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-fgw5-hp8f-xfhc Istio: SSRF via RequestAuthentication jwksUri
History

Thu, 07 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 07 May 2026 06:45:00 +0000

Type Values Removed Values Added
First Time appeared Istio
Istio istio
Vendors & Products Istio
Istio istio

Thu, 07 May 2026 05:30:00 +0000

Type Values Removed Values Added
Description Istio is an open platform to connect, manage, and secure microservices. Prior to versions 1.28.6 and 1.29.2, when a RequestAuthentication resource is created with a jwksUri pointing to an internal service, istiod makes an unauthenticated HTTP GET request to that URL without filtering out localhost or link local ips. This can result in sensitive data being distributed to Envoy proxies via xDS configuration. This issue has been patched in versions 1.28.6 and 1.29.2.
Title Istio Vulnerable to SSRF via RequestAuthentication jwksUri
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-07T12:59:35.159Z

Reserved: 2026-04-20T15:32:33.812Z

Link: CVE-2026-41413

cve-icon Vulnrichment

Updated: 2026-05-07T12:59:31.255Z

cve-icon NVD

Status : Received

Published: 2026-05-07T06:16:04.730

Modified: 2026-05-07T06:16:04.730

Link: CVE-2026-41413

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T07:30:24Z

Weaknesses