Duty Analyst: Joseph McCarthy

CVE-2026-22771

Published: 2026-01-12 19:16:03 | Last modified: 2026-02-05 21:04:50

HIGH CVSS 8.8
No EPSS data

Description

Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. Prior to 1.5.7 and 1.6.2, EnvoyExtensionPolicy Lua scripts executed by Envoy proxy can be used to leak the proxy's credentials. These credentials can then be used to communicate with the control plane and gain access to all secrets that are used by Envoy proxy, e.g. TLS private keys and credentials used for downstream and upstream communication. This vulnerability is fixed in 1.5.7 and 1.6.2.

CVSS details

Severity
high
Score
8.8
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

This CVE is not currently listed in the EPSS dataset.

Show JSON
{
    "cve": {
        "id": "CVE-2026-22771",
        "cveTags": [],
        "metrics": {
            "cvssMetricV31": [
                {
                    "type": "Secondary",
                    "source": "security-advisories@github.com",
                    "cvssData": {
                        "scope": "UNCHANGED",
                        "version": "3.1",
                        "baseScore": 8.8,
                        "attackVector": "NETWORK",
                        "baseSeverity": "HIGH",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "integrityImpact": "HIGH",
                        "userInteraction": "NONE",
                        "attackComplexity": "LOW",
                        "availabilityImpact": "HIGH",
                        "privilegesRequired": "LOW",
                        "confidentialityImpact": "HIGH"
                    },
                    "impactScore": 5.9,
                    "exploitabilityScore": 2.8
                }
            ]
        },
        "published": "2026-01-12T19:16:03.470",
        "references": [
            {
                "url": "https://github.com/envoyproxy/gateway/security/advisories/GHSA-xrwg-mqj6-6m22",
                "tags": [
                    "Exploit",
                    "Vendor Advisory",
                    "Mitigation"
                ],
                "source": "security-advisories@github.com"
            }
        ],
        "vulnStatus": "Analyzed",
        "weaknesses": [
            {
                "type": "Primary",
                "source": "security-advisories@github.com",
                "description": [
                    {
                        "lang": "en",
                        "value": "CWE-94"
                    }
                ]
            }
        ],
        "descriptions": [
            {
                "lang": "en",
                "value": "Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. Prior to 1.5.7 and 1.6.2, EnvoyExtensionPolicy Lua scripts executed by Envoy proxy can be used to leak the proxy's credentials. These credentials can then be used to communicate with the control plane and gain access to all secrets that are used by Envoy proxy, e.g. TLS private keys and credentials used for downstream and upstream communication. This vulnerability is fixed in 1.5.7 and 1.6.2."
            }
        ],
        "lastModified": "2026-02-05T21:04:49.683",
        "configurations": [
            {
                "nodes": [
                    {
                        "negate": false,
                        "cpeMatch": [
                            {
                                "criteria": "cpe:2.3:a:envoyproxy:gateway:*:*:*:*:*:*:*:*",
                                "vulnerable": true,
                                "matchCriteriaId": "E2A97BD9-F262-4D47-8C04-D4470FB7814A",
                                "versionEndExcluding": "1.5.7"
                            },
                            {
                                "criteria": "cpe:2.3:a:envoyproxy:gateway:*:*:*:*:*:*:*:*",
                                "vulnerable": true,
                                "matchCriteriaId": "F023F702-BA4E-4DD9-B7EE-31F221F632E0",
                                "versionEndExcluding": "1.6.2",
                                "versionStartIncluding": "1.6.0"
                            }
                        ],
                        "operator": "OR"
                    }
                ]
            }
        ],
        "sourceIdentifier": "security-advisories@github.com"
    }
}