Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9f29-v6mm-pw6w | opa-envoy-plugin has an Authorization Bypass via Double-Slash Path Misinterpretation in input.parsed_path |
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Open-policy-agent
Open-policy-agent opa-envoy-plugin |
|
| Vendors & Products |
Open-policy-agent
Open-policy-agent opa-envoy-plugin |
Fri, 20 Feb 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | opa-envoy-plugun is a plugin to enforce OPA policies with Envoy. Versions prior to 1.13.2-envoy-2 have a vulnerability in how the `input.parsed_path` field is constructed. HTTP request paths are treated as full URIs when parsed; interpreting leading path segments prefixed with double slashes (`//`) as authority components, and therefore dropping them from the parsed path. This creates a path interpretation mismatch between authorization policies and backend servers, enabling attackers to bypass access controls by crafting requests where the authorization filter evaluates a different path than the one ultimately served. Version 1.13.2-envoy-2 fixes the issue. | |
| Title | opa-envoy-plugin has an Authorization Bypass via Double-Slash Path Misinterpretation in `input.parsed_path` | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-19T21:22:21.384Z
Reserved: 2026-02-11T19:56:24.814Z
Link: CVE-2026-26205
Updated: 2026-02-19T20:54:44.736Z
Status : Deferred
Published: 2026-02-19T20:25:43.263
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-26205
No data.
OpenCVE Enrichment
Updated: 2026-02-20T09:54:13Z
Github GHSA