Contour has Lua code injection via Cookie Path Rewrite Policy
High severity
GitHub Reviewed
Published
Apr 20, 2026
in
projectcontour/contour
•
Updated Apr 24, 2026
Package
Affected versions
>= 1.19.0, < 1.31.6
>= 1.32.0, < 1.32.5
>= 1.33.0, < 1.33.4
Patched versions
1.31.6
1.32.5
1.33.4
Description
Published by the National Vulnerability Database
Apr 23, 2026
Published to the GitHub Advisory Database
Apr 24, 2026
Reviewed
Apr 24, 2026
Last updated
Apr 24, 2026
Impact
Contour's Cookie Rewriting feature is vulnerable to Lua code injection. An attacker with RBAC permissions to create or modify
HTTPProxyresources can craft a malicious value in the following fields that results in arbitrary code execution in the Envoy proxy:spec.routes[].cookieRewritePolicies[].pathRewrite.valuespec.routes[].services[].cookieRewritePolicies[].pathRewrite.valueThe cookie rewriting feature is internally implemented using Envoy's HTTP Lua filter. User-controlled values are interpolated into Lua source code using Go
text/templatewithout sufficient sanitization.The injected code only executes when processing traffic on the attacker's own route, which they already control. However, since Envoy runs as shared infrastructure, the injected code can also:
Other use cases of Lua filter are not vulnerable.
Patches
The fix is available in Contour v1.33.4, v1.32.5, and v1.31.6.
text/templateis removed. Requires Envoy 1.35.0 or later.Workarounds
There are no workarounds. Users should upgrade to a patched version.
References