A weakness has been identified in Envoy up to 1.33.0. Affected is the function params.add of the file source/extensions/filters/http/header_mutation/header_mutation.cc of the component Query Parameter Handler. This manipulation causes injection. Remote exploitation of the attack is possible. Patch name: f8f4f1e02fdc64ecd4acf2d903208dd7285ad3a4. It is suggested to install a patch to address this issue.
Metrics
Affected Vendors & Products
References
History
Sat, 25 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in Envoy up to 1.33.0. Affected is the function params.add of the file source/extensions/filters/http/header_mutation/header_mutation.cc of the component Query Parameter Handler. This manipulation causes injection. Remote exploitation of the attack is possible. Patch name: f8f4f1e02fdc64ecd4acf2d903208dd7285ad3a4. It is suggested to install a patch to address this issue. | |
| Title | Envoy Query Parameter header_mutation.cc params.add injection | |
| Weaknesses | CWE-707 CWE-74 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-25T19:00:19.151Z
Reserved: 2026-04-24T19:49:39.070Z
Link: CVE-2026-6994
No data.
Status : Received
Published: 2026-04-25T19:16:00.360
Modified: 2026-04-25T19:16:00.360
Link: CVE-2026-6994
No data.
OpenCVE Enrichment
No data.