LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-26311

CVE-2026-26311 - Vulnerability Analysis

MediumCVSS: 5.9

Last Updated: March 11, 2026

Envoy - Use After Free

Published: March 10, 2026Updated: March 11, 2026PoC AvailableRemote Exploitable

Overview

Envoy < 1.37.1, 1.36.5, 1.35.8, and 1.34.13 contains a use-after-free caused by improper state handling in HTTP connection manager's FilterManager::decodeData, letting attackers trigger filter callbacks on reset streams, exploit requires crafted HTTP/2 DATA frames.

Severity & Score

Severity: Medium
CVSS Score: 5.9

Impact

Attackers can cause use-after-free leading to potential memory corruption or denial of service.

Mitigation

Update to versions 1.37.1, 1.36.5, 1.35.8, or 1.34.13 or later.

Details

CVE ID
CVE-2026-26311
Severity
Medium
CVSS Score
5.9
Type
use_after_free
Status
confirmed

CWE

  • CWE-416

CVSS Metrics

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H