CVE-2026-26309

Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, an off-by-one write in Envoy::JsonEscaper::escapeString() can corrupt std::string null-termination, causing undefined behavior and potentially leading to crashes or out-of-bounds reads when the resulting string is later treated as a C-string. This vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:1.37.0:*:*:*:*:*:*:*

History

11 Mar 2026, 16:14

Type Values Removed Values Added
First Time Envoyproxy
Envoyproxy envoy
References () https://github.com/envoyproxy/envoy/security/advisories/GHSA-56cj-wgg3-x943 - () https://github.com/envoyproxy/envoy/security/advisories/GHSA-56cj-wgg3-x943 - Vendor Advisory, Exploit
CPE cpe:2.3:a:envoyproxy:envoy:1.37.0:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*

11 Mar 2026, 13:53

Type Values Removed Values Added
Summary
  • (es) Envoy es un proxy de borde/intermedio/servicio de alto rendimiento. Antes de 1.37.1, 1.36.5, 1.35.8 y 1.34.13, una escritura por un byte en Envoy::JsonEscaper::escapeString() puede corromper la terminación nula de std::string, causando comportamiento indefinido y potencialmente llevando a fallos o lecturas fuera de límites cuando la cadena resultante es tratada posteriormente como una cadena C. Esta vulnerabilidad está corregida en 1.37.1, 1.36.5, 1.35.8 y 1.34.13.

10 Mar 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-10 20:16

Updated : 2026-03-11 16:14


NVD link : CVE-2026-26309

Mitre link : CVE-2026-26309

CVE.ORG link : CVE-2026-26309


JSON object : View

Products Affected

envoyproxy

  • envoy
CWE
CWE-193

Off-by-one Error