Project Subscriptions
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-1853 | A flaw was found in OpenShift Service Mesh 2.6.3 and 2.5.6. Rate-limiter avoidance, access-control bypass, CPU and memory exhaustion, and replay attacks may be possible due to improper HTTP header sanitization in Envoy. |
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Thu, 19 Feb 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 31 Jul 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat openshift Service Mesh
|
|
| CPEs | cpe:2.3:a:redhat:openshift_service_mesh:2.5.6:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_service_mesh:2.6.3:*:*:*:*:*:*:* |
|
| Vendors & Products |
Redhat openshift Service Mesh
|
Tue, 28 Jan 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Jan 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | envoyproxy: OpenShift Service Mesh Envoy HTTP Header Sanitization Bypass Leading to DoS and Unauthorized Access | Envoyproxy: openshift service mesh envoy http header sanitization bypass leading to dos and unauthorized access |
| First Time appeared |
Redhat
Redhat service Mesh |
|
| CPEs | cpe:/a:redhat:service_mesh:2 | |
| Vendors & Products |
Redhat
Redhat service Mesh |
|
| References |
|
Tue, 28 Jan 2025 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in OpenShift Service Mesh 2.6.3 and 2.5.6. Rate-limiter avoidance, access-control bypass, CPU and memory exhaustion, and replay attacks may be possible due to improper HTTP header sanitization in Envoy. | |
| Title | envoyproxy: OpenShift Service Mesh Envoy HTTP Header Sanitization Bypass Leading to DoS and Unauthorized Access | |
| Weaknesses | CWE-444 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-02-19T08:34:02.636Z
Reserved: 2025-01-27T14:16:01.506Z
Link: CVE-2025-0752
Updated: 2025-01-28T14:35:20.372Z
Status : Modified
Published: 2025-01-28T10:15:09.493
Modified: 2026-02-19T09:16:09.923
Link: CVE-2025-0752
OpenCVE Enrichment
No data.
EUVD