Ad

CVE-2026-32811

HIGH CVSS 3.1: 7.5 EPSS 0.01%
Updated Mar 30, 2026
Dadrus
Parameter Value
CVSS 7.5 (HIGH)
Affected Versions 0.7.0 — 0.17.11
Fixed In 0.17.11
Type CWE-863 (Incorrect Authorization), CWE-116 (Improper Encoding or Escaping of Output)
Vendor Dadrus
Public PoC No

Heimdall is a cloud native Identity Aware Proxy and Access Control Decision service. When using Heimdall in envoy gRPC decision API mode with versions 0.7.0-alpha through 0.17.10, wrong encoding of the query URL string allows rules with non-wildcard path expressions to be bypassed. Envoy splits the requested URL into parts, and sends the parts individually to Heimdall.

Although query and path are present in the API, the query field is documented to be always empty and the URL query is included in the path field. The implementation uses go's url library to reconstruct the url which automatically encodes special characters in the path. As a consequence, a parameter like /mypath?foo=bar to Path is escaped into /mypath%3Ffoo=bar.

Subsequently, a rule matching /mypath no longer matches and is bypassed. The issue can only lead to unintended access if Heimdall is configured with an "allow all" default rule. Since v0.16.0, Heimdall enforces secure defaults and refuses to start with such a configuration unless this enforcement is explicitly disabled, e.g. via --insecure-skip-secure-default-rule-enforcement or the broader --insecure flag.

This issue has been fixed in version 0.17.11.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
None
No data leak
Integrity
High
Complete data modification
Availability
None
No disruption

CVSS Vector v3.1

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Dadrus Heimdall
cpe:2.3:a:dadrus:heimdall:*:*:*:*:*:*:*:*
0.7.0 0.17.11