Authorization Bypass Vulnerability in gRPC-Go by Google
CVE-2026-33186

9.1CRITICAL

Key Information:

Vendor

Grpc

Status
Vendor
CVE Published:
20 March 2026

Badges

📈 Score: 192👾 Exploit Exists🟡 Public PoC

What is CVE-2026-33186?

CVE-2026-33186 is a vulnerability present in gRPC-Go, which is an implementation of the gRPC framework specifically for the Go programming language. gRPC is widely used for building efficient, distributed systems due to its ability to enable communication between applications through remote procedure calls. The vulnerability stems from an authorization bypass caused by improper input validation of the HTTP/2 :path pseudo-header. Specifically, it arises when requests with :path values that omit the necessary leading slash are incorrectly processed. This flaw allows such requests to be routed to the appropriate handlers while bypassing necessary authorization checks, as the authorization interceptors evaluate the non-canonical path rather than the expected canonical path. The potential for exploitation is particularly concerning, as attackers can send malformed HTTP/2 frames directly to the gRPC server, potentially circumventing security measures in place.

Potential impact of CVE-2026-33186

  1. Unauthorized Access to Sensitive Functions: The vulnerability allows malicious actors to manipulate HTTP/2 :path headers, which could enable unauthorized access to certain functions or data within the application. This could result in significant data breaches or exposure of sensitive functionality.

  2. Bypassing Security Policies: Administrative policies that define access controls based on specific paths may be rendered ineffective. With the ability to bypass canonical path checks, attackers can exploit fallback rules that allow requests, putting the system’s security framework at risk.

  3. Increased Risk of Exploit in Distributed Systems: Given that gRPC is frequently utilized in microservices architectures, this vulnerability could have a cascading effect across interconnected services, creating broader security challenges and increasing the overall attack surface for organizations relying on gRPC-Go for their infrastructure.

Affected Version(s)

grpc-go < 1.79.3

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.