CVE-2026-41246
Published:April 23, 2026
Updated:April 26, 2026
Contour is a Kubernetes ingress controller using Envoy proxy. From v1.19.0 to before v1.33.4, v1.32.5, and v1.31.6, Contour's Cookie Rewriting feature is vulnerable to Lua code injection. An attacker with RBAC permissions to create or modify HTTPProxy resources can craft a malicious value in spec.routes[].cookieRewritePolicies[].pathRewrite.value or spec.routes[].services[].cookieRewritePolicies[].pathRewrite.value that results in arbitrary code execution in the Envoy proxy. The cookie rewriting feature is internally implemented using Envoy's HTTP Lua filter. User-controlled values are interpolated into Lua source code using Go text/template without sufficient sanitization. The injected code only executes when processing traffic on the attacker's own route, which they already control. However, since Envoy runs as shared infrastructure, the injected code can also read Envoy's xDS client credentials from the filesystem or cause denial of service for other tenants sharing the Envoy instance. This vulnerability is fixed in v1.33.4, v1.32.5, and v1.31.6.
Affected Packages
https://github.com/projectcontour/contour.git (GITHUB):
Affected version(s) >=v1.33.0 <v1.33.4Fix Suggestion:
Update to version v1.33.4https://github.com/projectcontour/contour.git (GITHUB):
Affected version(s) >=v0.1.0 <v1.31.6Fix Suggestion:
Update to version v1.31.6https://github.com/projectcontour/contour.git (GITHUB):
Affected version(s) >=v1.32.0 <v1.32.5Fix Suggestion:
Update to version v1.32.5github.com/projectcontour/contour (GO):
Affected version(s) >=v1.32.0 <v1.32.5Fix Suggestion:
Update to version v1.32.5github.com/projectcontour/contour (GO):
Affected version(s) >=v0.0.0-20221212202358-a0e9e6d920f1 <v1.31.6Fix Suggestion:
Update to version v1.31.6github.com/projectcontour/contour (GO):
Affected version(s) >=v1.19.0 <v1.31.6Fix Suggestion:
Update to version v1.31.6github.com/projectcontour/contour (GO):
Affected version(s) >=v1.33.0 <v1.33.4Fix Suggestion:
Update to version v1.33.4Related Resources (8)
Do you need more information?
Contact UsCVSS v4
Base Score:
7.2
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
NONE
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
8.1
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
HIGH
Weakness Type (CWE)
Improper Control of Generation of Code ('Code Injection')
EPSS
Base Score:
0.07