NIXPKGS-2026-0289
GitHub issue
published on 20 Feb 2026
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse accepted
- @LeSuisse published on GitHub
opa-envoy-plugin has an Authorization Bypass via Double-Slash Path Misinterpretation in `input.parsed_path`
opa-envoy-plugun is a plugin to enforce OPA policies with Envoy. Versions prior to 1.13.2-envoy-2 have a vulnerability in how the `input.parsed_path` field is constructed. HTTP request paths are treated as full URIs when parsed; interpreting leading path segments prefixed with double slashes (`//`) as authority components, and therefore dropping them from the parsed path. This creates a path interpretation mismatch between authorization policies and backend servers, enabling attackers to bypass access controls by crafting requests where the authorization filter evaluates a different path than the one ultimately served. Version 1.13.2-envoy-2 fixes the issue.
Affected products
opa-envoy-plugin
- ==< 1.13.2-envoy-2
Matching in nixpkgs
pkgs.opa-envoy-plugin
A plugin to enforce OPA policies with Envoy
-
nixos-unstable 1.13.1-envoy
- nixpkgs-unstable 1.13.1-envoy
- nixos-unstable-small 1.13.1-envoy
-
nixos-25.11 1.10.0-envoy
- nixos-25.11-small 1.10.0-envoy
- nixpkgs-25.11-darwin 1.10.0-envoy
Package maintainers
-
@charlieegan3 Charlie Egan <git@charlieegan3.com>