CVE-2026-32811 - Vulnerability Analysis
HighCVSS: 8.2Last Updated: March 20, 2026
Heimdall - Access Control Bypass
Published: March 20, 2026Updated: March 20, 2026Remote Exploitable
Overview
Heimdall 0.7.0-alpha through 0.17.10 contains an access control bypass caused by incorrect encoding of query URL strings in envoy gRPC decision API mode, letting attackers bypass non-wildcard path rules, exploit requires insecure default rule configuration.
Severity & Score
Severity: High
CVSS Score: 8.2
Impact
Attackers can bypass path-based access control rules, potentially gaining unintended access to protected resources.
Mitigation
Upgrade to version 0.17.11 or later.
References
- https://github.com/dadrus/heimdall/commit/50321b3007db1ccafdc6b1cfd6bdc3689c19a502
- https://github.com/dadrus/heimdall/pull/3106
- https://github.com/dadrus/heimdall/security/advisories/GHSA-r8x2-fhmf-6mxp
- https://github.com/envoyproxy/envoy/blob/105b4acd422d67fcff908ec38d91c7676d079939/api/envoy/service/auth/v3/attribute_context.proto#L146-L147
Related Resources
Details
- CVE ID
- CVE-2026-32811
- Severity
- High
- CVSS Score
- 8.2
- Type
- broken_access_control
- Status
- new
CWE
- CWE-116
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N