Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/envoyproxy/gateway
  4. ›
  5. CVE-2025-24030

CVE-2025-24030: Envoy Admin Interface Exposed through prometheus metrics endpoint

January 23, 2025

A user with access to a Kubernetes cluster where Envoy Gateway is installed can use a path traversal attack to execute Envoy Admin interface commands on proxies managed by Envoy Gateway. The admin interface can be used to terminate the Envoy process and extract the Envoy configuration (possibly containing confidential data).

For example, the following command, if run from within the Kubernetes cluster, can be used to get the configuration dump of the proxy:

curl --path-as-is http://<Proxy-Service-ClusterIP>:19001/stats/prometheus/../../config_dump

References

  • github.com/advisories/GHSA-j777-63hf-hx76
  • github.com/envoyproxy/gateway
  • github.com/envoyproxy/gateway/commit/3eb3301ab3dbf12b201b47bdb6074d1233be07bd
  • github.com/envoyproxy/gateway/security/advisories/GHSA-j777-63hf-hx76
  • nvd.nist.gov/vuln/detail/CVE-2025-24030
  • www.envoyproxy.io/docs/envoy/latest/configuration/best_practices/edge
  • www.envoyproxy.io/docs/envoy/latest/operations/admin

Code Behaviors & Features

Detect and mitigate CVE-2025-24030 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.2.6

Fixed versions

  • 1.2.6

Solution

Upgrade to version 1.2.6 or above.

Impact 7.1 HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

Learn more about CVSS

Weakness

  • CWE-419: Unprotected Primary Channel

Source file

go/github.com/envoyproxy/gateway/CVE-2025-24030.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:51 +0000.