High severityOSV Advisory· Published Jan 12, 2026· Updated Jan 12, 2026
Envoy Extension Policy lua scripts injection causes arbitrary command execution
CVE-2026-22771
Description
Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. Prior to 1.5.7 and 1.6.2, EnvoyExtensionPolicy Lua scripts executed by Envoy proxy can be used to leak the proxy's credentials. These credentials can then be used to communicate with the control plane and gain access to all secrets that are used by Envoy proxy, e.g. TLS private keys and credentials used for downstream and upstream communication. This vulnerability is fixed in 1.5.7 and 1.6.2.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/envoyproxy/gatewayGo | >= 1.6.0-rc.0, < 1.6.2 | 1.6.2 |
github.com/envoyproxy/gatewayGo | < 1.5.7 | 1.5.7 |
Affected products
1- Range: latest, v0.1.0, v0.2.0, …
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-xrwg-mqj6-6m22ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-22771ghsaADVISORY
- github.com/envoyproxy/gateway/security/advisories/GHSA-xrwg-mqj6-6m22ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.