CVE-2025-0752

A flaw was found in OpenShift Service Mesh 2.6.3 and 2.5.6. Rate-limiter avoidance, access-control bypass, CPU and memory exhaustion, and replay attacks may be possible due to improper HTTP header sanitization in Envoy.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:openshift_service_mesh:2.5.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_service_mesh:2.6.3:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-01-28 10:15

Updated : 2025-07-31 18:29


NVD link : CVE-2025-0752

Mitre link : CVE-2025-0752

CVE.ORG link : CVE-2025-0752


JSON object : View

Products Affected

redhat

  • openshift_service_mesh
CWE
CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')