CVE-2025-0752
Envoyproxy: openshift service mesh envoy http header sanitization bypass leading to dos and unauthorized access
CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
0th
A flaw was found in OpenShift Service Mesh 2.6.3 and 2.5.6. Rate-limiter avoidance, access-control bypass, CPU and memory exhaustion, and replay attacks may be possible due to improper HTTP header sanitization in Envoy.
| CWE | CWE-444 |
| Published | Jan 28, 2025 |
| Last Updated | Feb 24, 2026 |
Stay Ahead of the Next One
Get instant alerts for
Be the first to know when new high vulnerabilities are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
High
Affected Versions
Red Hat / OpenShift Service Mesh 2
All versions affected Red Hat / OpenShift Service Mesh 2
All versions affected References
Credits
Red Hat would like to thank Antony Di Scala and Michael Whale for reporting this issue.