Use-After-Free Vulnerability in Envoy Edge and Service Proxy
CVE-2025-62504

6.5MEDIUM

Key Information:

Vendor

Envoyproxy

Status
Vendor
CVE Published:
16 October 2025

What is CVE-2025-62504?

Envoy, an open source edge and service proxy, is affected by a use-after-free vulnerability in the Lua filter. When a Lua script modifies a response body to exceed a set size limit, Envoy can generate a local reply that overrides original response headers. This condition results in dangling references, potentially leading to a denial of service by crashing the proxy. Mitigation involves updating to the fixed versions of Envoy or adjusting buffer limits, although these adjustments do not resolve the fundamental memory safety issue.

Affected Version(s)

envoy >= 1.36.0, <= 1.36.1 <= 1.36.0, 1.36.1

envoy >= 1.350, <= 1.35.5 <= 1.350, 1.35.5

envoy >= 1.34.0, <= 1.34.9 <= 1.34.0, 1.34.9

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-62504 : Use-After-Free Vulnerability in Envoy Edge and Service Proxy