A flaw was found in OpenShift Service Mesh 2.6.3 and 2.5.6. Rate-limiter avoidance, access-control bypass, CPU and memory exhaustion, and replay attacks may be possible due to improper HTTP header sanitization in Envoy.

Project Subscriptions

Vendors Products
Openshift Service Mesh Subscribe
Service Mesh Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2025-1853 A flaw was found in OpenShift Service Mesh 2.6.3 and 2.5.6. Rate-limiter avoidance, access-control bypass, CPU and memory exhaustion, and replay attacks may be possible due to improper HTTP header sanitization in Envoy.
Fixes

Solution

No solution given by the vendor.


Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

History

Thu, 19 Feb 2026 08:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H'}


Thu, 31 Jul 2025 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat openshift Service Mesh
CPEs cpe:2.3:a:redhat:openshift_service_mesh:2.5.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_service_mesh:2.6.3:*:*:*:*:*:*:*
Vendors & Products Redhat openshift Service Mesh

Tue, 28 Jan 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 28 Jan 2025 09:45:00 +0000

Type Values Removed Values Added
Title envoyproxy: OpenShift Service Mesh Envoy HTTP Header Sanitization Bypass Leading to DoS and Unauthorized Access Envoyproxy: openshift service mesh envoy http header sanitization bypass leading to dos and unauthorized access
First Time appeared Redhat
Redhat service Mesh
CPEs cpe:/a:redhat:service_mesh:2
Vendors & Products Redhat
Redhat service Mesh
References

Tue, 28 Jan 2025 03:15:00 +0000

Type Values Removed Values Added
Description A flaw was found in OpenShift Service Mesh 2.6.3 and 2.5.6. Rate-limiter avoidance, access-control bypass, CPU and memory exhaustion, and replay attacks may be possible due to improper HTTP header sanitization in Envoy.
Title envoyproxy: OpenShift Service Mesh Envoy HTTP Header Sanitization Bypass Leading to DoS and Unauthorized Access
Weaknesses CWE-444
References
Metrics threat_severity

None

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

threat_severity

Moderate


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-02-19T08:34:02.636Z

Reserved: 2025-01-27T14:16:01.506Z

Link: CVE-2025-0752

cve-icon Vulnrichment

Updated: 2025-01-28T14:35:20.372Z

cve-icon NVD

Status : Modified

Published: 2025-01-28T10:15:09.493

Modified: 2026-02-19T09:16:09.923

Link: CVE-2025-0752

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-01-21T00:00:00Z

Links: CVE-2025-0752 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses