CVE-2025-55162
September 03, 2025
Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In versions below 1.32.10 and 1.33.0 through 1.33.6, 1.34.0 through 1.34.4 and 1.35.0, insufficient Session Expiration in the Envoy OAuth2 filter leads to failed logout operations. When configured with __Secure- or __Host- prefixed cookie names, the filter fails to append the required Secure attribute to the Set-Cookie header during deletion. Modern browsers ignore this invalid request, causing the session cookie to persist. This allows a user to remain logged in after they believe they have logged out, creating a session hijacking risk on shared computers. The current implementation iterates through the configured cookie names to generate deletion headers but does not check for these prefixes. This failure to properly construct the deletion header means the user's session cookies are never removed by the browser, leaving the session active and allowing the next user of the same browser to gain unauthorized access to the original user's account and data. This is fixed in versions 1.32.10, 1.33.7, 1.34.5 and 1.35.1.
Affected Packages
https://github.com/envoyproxy/envoy.git (GITHUB):
Affected version(s) >=v1.34.0 <v1.34.6Fix Suggestion:
Update to version v1.34.6https://github.com/envoyproxy/envoy.git (GITHUB):
Affected version(s) >=v1.33.0 <v1.33.8Fix Suggestion:
Update to version v1.33.8https://github.com/envoyproxy/envoy.git (GITHUB):
Affected version(s) >=v1.33.0 <v1.33.8Fix Suggestion:
Update to version v1.33.8https://github.com/envoyproxy/envoy.git (GITHUB):
Affected version(s) >=v1.0.0 <v1.32.11Fix Suggestion:
Update to version v1.32.11https://github.com/envoyproxy/envoy.git (GITHUB):
Affected version(s) >=v1.0.0 <v1.32.11Fix Suggestion:
Update to version v1.32.11https://github.com/envoyproxy/envoy.git (GITHUB):
Affected version(s) >=v1.35.0 <v1.35.2Fix Suggestion:
Update to version v1.35.2Related ResourcesĀ (2)
Do you need more information?
Contact UsCVSS v4
Base Score:
7
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
PASSIVE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
LOW
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
6.3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
Insufficient Session Expiration
EPSS
Base Score:
0.01