๐Ÿ” CVE Alert

CVE-2026-26205

UNKNOWN 0.0

opa-envoy-plugin has an Authorization Bypass via Double-Slash Path Misinterpretation in `input.parsed_path`

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

opa-envoy-plugun is a plugin to enforce OPA policies with Envoy. Versions prior to 1.13.2-envoy-2 have a vulnerability in how the `input.parsed_path` field is constructed. HTTP request paths are treated as full URIs when parsed; interpreting leading path segments prefixed with double slashes (`//`) as authority components, and therefore dropping them from the parsed path. This creates a path interpretation mismatch between authorization policies and backend servers, enabling attackers to bypass access controls by crafting requests where the authorization filter evaluates a different path than the one ultimately served. Version 1.13.2-envoy-2 fixes the issue.

CWE CWE-863
Vendor open-policy-agent
Product opa-envoy-plugin
Published Feb 19, 2026
Last Updated Feb 19, 2026
Stay Ahead of the Next One

Get instant alerts for open-policy-agent opa-envoy-plugin

Be the first to know when new unknown vulnerabilities affecting open-policy-agent opa-envoy-plugin are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

open-policy-agent / opa-envoy-plugin
< 1.13.2-envoy-2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/open-policy-agent/opa-envoy-plugin/security/advisories/GHSA-9f29-v6mm-pw6w github.com: https://github.com/open-policy-agent/opa-envoy-plugin/commit/58c44d4ec408d5852d1d0287599e7d5c5e2bc5c3 github.com: https://github.com/open-policy-agent/opa-envoy-plugin/releases/tag/v1.13.2-envoy-2