Expired Pointer Dereference Affecting envoyproxy/envoy package, versions [,1.33.12)[1.34.0, 1.34.10)[1.35.0,1.35.6)[1.36.0, 1.36.2)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-ENVOYPROXYENVOY-13635733
  • published19 Oct 2025
  • disclosed16 Oct 2025
  • creditcasper-lc

Introduced: 16 Oct 2025

NewCVE-2025-62504  (opens in a new tab)
CWE-825  (opens in a new tab)

How to fix?

Upgrade envoyproxy/envoy to version 1.33.12, 1.34.10, 1.35.6, 1.36.2 or higher.

Overview

Affected versions of this package are vulnerable to Expired Pointer Dereference in the Lua filter when a Lua script rewrites a response body so that its size exceeds the configured per_connection_buffer_limit_bytes, which results in the process crashing due to dangling references. An attacker can cause a crash of the process by adding a malicious Lua filter file and triggering an oversized rewritten response body. This is only exploitable if the attacker has sufficient privileges to add a Lua filter file.

CVSS Base Scores

version 4.0
version 3.1