Unrated severityNVD Advisory· Published Jun 9, 2022· Updated Apr 23, 2025
Trivial authentication bypass in Envoy
CVE-2022-29226
Description
Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter implementation does not include a mechanism for validating access tokens, so by design when the HMAC signed cookie is missing a full authentication flow should be triggered. However, the current implementation assumes that access tokens are always validated thus allowing access in the presence of any access token attached to the request. Users are advised to upgrade. There is no known workaround for this issue.
Affected products
1- Range: < 1.22.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/envoyproxy/envoy/commit/7ffda4e809dec74449ebc330cebb9d2f4ab61360mitrex_refsource_MISC
- github.com/envoyproxy/envoy/security/advisories/GHSA-h45c-2f94-prxhmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.