A flaw was found in OpenShift Service Mesh 2.6.3 and 2.5.6. Rate-limiter avoidance, access-control bypass, CPU and memory exhaustion, and replay attacks may be possible due to improper HTTP header sanitization in Envoy.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2025-0752 | Vendor Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2339115 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-01-28 10:15
Updated : 2025-07-31 18:29
NVD link : CVE-2025-0752
Mitre link : CVE-2025-0752
CVE.ORG link : CVE-2025-0752
JSON object : View
Products Affected
redhat
- openshift_service_mesh
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
