CVE-2025-0754

MEDIUM

OpenShift Service Mesh 2.6.3-2.5.6 - Log Injection

Title source: llm
STIX 2.1

Description

The vulnerability was found in OpenShift Service Mesh 2.6.3 and 2.5.6. This issue occurs due to improper sanitization of HTTP headers by Envoy, particularly the x-forwarded-for header. This lack of sanitization can allow attackers to inject malicious payloads into service mesh logs, leading to log injection and spoofing attacks. Such injections can mislead logging mechanisms, enabling attackers to manipulate log entries or execute reflected cross-site scripting (XSS) attacks.

Scores

CVSS v3 4.3
EPSS 0.0022
EPSS Percentile 44.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-117
Status published
Products (1)
Red Hat/OpenShift Service Mesh 2
Published Jan 28, 2025
Tracked Since Feb 18, 2026