CVE-2026-26311 - Vulnerability Analysis
MediumCVSS: 5.9Last Updated: March 11, 2026
Envoy - Use After Free
Published: March 10, 2026Updated: March 11, 2026PoC AvailableRemote Exploitable
Overview
Envoy < 1.37.1, 1.36.5, 1.35.8, and 1.34.13 contains a use-after-free caused by improper state handling in HTTP connection manager's FilterManager::decodeData, letting attackers trigger filter callbacks on reset streams, exploit requires crafted HTTP/2 DATA frames.
Severity & Score
Severity: Medium
CVSS Score: 5.9
Impact
Attackers can cause use-after-free leading to potential memory corruption or denial of service.
Mitigation
Update to versions 1.37.1, 1.36.5, 1.35.8, or 1.34.13 or later.
Related Resources
Details
- CVE ID
- CVE-2026-26311
- Severity
- Medium
- CVSS Score
- 5.9
- Type
- use_after_free
- Status
- confirmed
CWE
- CWE-416
CVSS Metrics
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H