CVE-2025-24030: Envoy Admin Interface Exposed through prometheus metrics endpoint
7.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.4285%
CWE
Published
1/23/2025
Updated
1/23/2025
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/envoyproxy/gateway | go | < 1.2.6 | 1.2.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from two key misconfigurations: 1) Using prefix matching instead of exact path matching for the /stats/prometheus endpoint, which didn't prevent path traversal sequences. 2) Lack of path normalization (normalize_path=true) in the HTTP connection manager configuration, which failed to collapse path traversal sequences before route matching. The commit diff shows these were fixed by replacing 'prefix: /stats/prometheus' with exact 'path' matching + method headers, and adding normalize_path=true. These configurations were present in multiple bootstrap/test files, making the pre-patch route matching functions vulnerable.