CVE-2026-22771

Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. Prior to 1.5.7 and 1.6.2, EnvoyExtensionPolicy Lua scripts executed by Envoy proxy can be used to leak the proxy's credentials. These credentials can then be used to communicate with the control plane and gain access to all secrets that are used by Envoy proxy, e.g. TLS private keys and credentials used for downstream and upstream communication. This vulnerability is fixed in 1.5.7 and 1.6.2.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:envoyproxy:gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:gateway:*:*:*:*:*:*:*:*

History

05 Feb 2026, 21:04

Type Values Removed Values Added
First Time Envoyproxy gateway
Envoyproxy
References () https://github.com/envoyproxy/gateway/security/advisories/GHSA-xrwg-mqj6-6m22 - () https://github.com/envoyproxy/gateway/security/advisories/GHSA-xrwg-mqj6-6m22 - Exploit, Vendor Advisory, Mitigation
CPE cpe:2.3:a:envoyproxy:gateway:*:*:*:*:*:*:*:*

12 Jan 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-12 19:16

Updated : 2026-02-05 21:04


NVD link : CVE-2026-22771

Mitre link : CVE-2026-22771

CVE.ORG link : CVE-2026-22771


JSON object : View

Products Affected

envoyproxy

  • gateway
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')