Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-1279

NIXPKGS-2026-1279
published on
Permalink CVE-2026-6994
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 3 hours ago by @LeSuisse Activity log
Envoy Query Parameter header_mutation.cc params.add injection

A weakness has been identified in Envoy up to 1.33.0. Affected is the function params.add of the file source/extensions/filters/http/header_mutation/header_mutation.cc of the component Query Parameter Handler. This manipulation causes injection. Remote exploitation of the attack is possible. Patch name: f8f4f1e02fdc64ecd4acf2d903208dd7285ad3a4. It is suggested to install a patch to address this issue.

Affected products

Envoy
  • ==1.0
  • ==1.28
  • ==1.32
  • ==1.22
  • ==1.26
  • ==1.17
  • ==1.24
  • ==1.18
  • ==1.21
  • ==1.6
  • ==1.16
  • ==1.20
  • ==1.12
  • ==1.30
  • ==1.3
  • ==1.11
  • ==1.1
  • ==1.10
  • ==1.29
  • ==1.4
  • ==1.15
  • ==1.9
  • ==1.19
  • ==1.23
  • ==1.33.0
  • ==1.27
  • ==1.7
  • ==1.5
  • ==1.8
  • ==1.2
  • ==1.25
  • ==1.13
  • ==1.31
  • ==1.14

Matching in nixpkgs

Ignored packages (11)

Package maintainers

Patch: https://github.com/envoyproxy/envoy/commit/be601deb69247f1c192c4d3548102bddac756729