Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. In all Envoy Gateway versions prior to 1.2.7 and 1.3.1 a default Envoy Proxy access log configuration is used. This format is vulnerable to log injection attacks. If the attacker uses a specially crafted user-agent which performs json injection, then he could add and overwrite fields to the access log. This vulnerability is fixed in 1.3.1 and 1.2.7. One can overwrite the old text based default format with JSON formatter by modifying the "EnvoyProxy.spec.telemetry.accessLog" setting.
References
Link | Resource |
---|---|
https://github.com/envoyproxy/gateway/commit/8f48f5199cf1bbb9a8ac0695c5171bfef6c9198a | Patch |
https://github.com/envoyproxy/gateway/security/advisories/GHSA-mf24-chxh-hmvj | Third Party Advisory Mitigation |
Configurations
Configuration 1 (hide)
|
History
04 Sep 2025, 13:52
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:envoyproxy:gateway:*:*:*:*:*:*:*:* | |
First Time |
Envoyproxy
Envoyproxy gateway |
|
References | () https://github.com/envoyproxy/gateway/commit/8f48f5199cf1bbb9a8ac0695c5171bfef6c9198a - Patch | |
References | () https://github.com/envoyproxy/gateway/security/advisories/GHSA-mf24-chxh-hmvj - Third Party Advisory, Mitigation | |
Summary |
|
06 Mar 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-06 19:15
Updated : 2025-09-04 13:52
NVD link : CVE-2025-25294
Mitre link : CVE-2025-25294
CVE.ORG link : CVE-2025-25294
JSON object : View
Products Affected
envoyproxy
- gateway
CWE
CWE-117
Improper Output Neutralization for Logs