NULL Pointer Dereference Affecting envoyproxy/envoy package, versions [1.8.0, 1.33.13)[1.34.0, 1.34.11)[1.35.0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about NULL Pointer Dereference vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-ENVOYPROXYENVOY-14176092
  • published4 Dec 2025
  • disclosed3 Dec 2025
  • creditbotengyao

Introduced: 3 Dec 2025

NewCVE-2025-64527  (opens in a new tab)
CWE-476  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

Affected versions of this package are vulnerable to NULL Pointer Dereference in the JwksFetcherImpl. An attacker can cause a crash by sending requests with multiple JWT tokens, triggering a re-entry bug that leads to a null pointer dereference when the asynchronous HTTP response arrives.

Workaround

  • Disable the allow_missing_or_failed or allow_missing

Notes:

  • This is only exploitable if allow_missing_or_failed or allow_missing is enabled.
  • The fix for this vulnerability should also be included in v1.35.7 and v1.36.3; however, at the time of updating this advisory, those were not released yet.

CVSS Base Scores

version 4.0
version 3.1