Description
Dapr is a portable, event-driven, runtime for building distributed applications across cloud and edge. From versions 1.3.0 to before 1.15.14, 1.16.0-rc.1 to before 1.16.14, and 1.17.0-rc.1 to before 1.17.5, a vulnerability has been found in Dapr that allows bypassing access control policies for service invocation using reserved URL characters and path traversal sequences in method paths. The ACL normalized the method path independently from the dispatch layer, so the ACL evaluated one path while the target application received a different one. This issue has been patched in versions 1.15.14, 1.16.14, and 1.17.5.
References (2)
Core 2
Core References
X_Refsource_Confirm x_refsource_confirm
https://github.com/dapr/dapr/security/advisories/GHSA-85gx-3qv6-4463
X_Refsource_Misc x_refsource_misc
https://github.com/dapr/dapr/pull/9589
Scores
CVSS v3
8.1
EPSS
0.0003
EPSS Percentile
10.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-22
CWE-284
Status
published
Products (7)
dapr/dapr
1.16.0-rc.1 - 1.16.14Go
dapr/dapr
1.17.0-rc.1 - 1.17.5Go
dapr/dapr
1.3.0 - 1.15.14Go
dapr/dapr
>= 1.16.0-rc.1, < 1.16.14
dapr/dapr
>= 1.17.0-rc.1, < 1.17.5
dapr/dapr
>= 1.3.0, < 1.15.14
linuxfoundation/dapr
1.3.0 - 1.15.14
Published
May 08, 2026
Tracked Since
May 08, 2026