Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. google.golang.org/grpc
  4. ›
  5. CVE-2026-33186

CVE-2026-33186: gRPC-Go has an authorization bypass via missing leading slash in :path

March 18, 2026

What kind of vulnerability is it? Who is impacted?

It is an Authorization Bypass resulting from Improper Input Validation of the HTTP/2 :path pseudo-header.

The gRPC-Go server was too lenient in its routing logic, accepting requests where the :path omitted the mandatory leading slash (e.g., Service/Method instead of /Service/Method). While the server successfully routed these requests to the correct handler, authorization interceptors (including the official grpc/authz package) evaluated the raw, non-canonical path string. Consequently, “deny” rules defined using canonical paths (starting with /) failed to match the incoming request, allowing it to bypass the policy if a fallback “allow” rule was present.

Who is impacted? This affects gRPC-Go servers that meet both of the following criteria:

  1. They use path-based authorization interceptors, such as the official RBAC implementation in google.golang.org/grpc/authz or custom interceptors relying on info.FullMethod or grpc.Method(ctx).
  2. Their security policy contains specific “deny” rules for canonical paths but allows other requests by default (a fallback “allow” rule).

The vulnerability is exploitable by an attacker who can send raw HTTP/2 frames with malformed :path headers directly to the gRPC server.

References

  • github.com/advisories/GHSA-p77j-4mvh-x3m3
  • github.com/grpc/grpc-go
  • github.com/grpc/grpc-go/security/advisories/GHSA-p77j-4mvh-x3m3
  • nvd.nist.gov/vuln/detail/CVE-2026-33186

Code Behaviors & Features

Detect and mitigate CVE-2026-33186 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.79.3

Fixed versions

  • 1.79.3

Solution

Upgrade to version 1.79.3 or above.

Impact 9.1 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-285: Improper Authorization

Source file

go/google.golang.org/grpc/CVE-2026-33186.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:17:26 +0000.