Vulnerability Description
Heimdall is a cloud native Identity Aware Proxy and Access Control Decision service. Prior to version 0.17.14, Heimdall performs rule matching on the raw (non-normalized) request path, while downstream components may normalize dot-segments according to RFC 3986, Section 6.2.2.3. This discrepancy can result in heimdall authorizing a request for one path (e.g., /user/../admin, or URL-encoded variants such as /user/%2e%2e/admin or /user/%2e%2e%2fadmin. The latter would require the allow_encoded_slashes option to be set to on or no_decode.) while the downstream ultimately processes a different, normalized path (/admin). This issue has been patched in version 0.17.14.
Related Weaknesses (CWE)
References
- https://github.com/dadrus/heimdall/commit/b5dfa484b7a8c2ce6d8691c026f9da86771994
- https://github.com/dadrus/heimdall/pull/3209
- https://github.com/dadrus/heimdall/releases/tag/v0.17.14
- https://github.com/dadrus/heimdall/security/advisories/GHSA-3q34-rx83-r6mq
FAQ
What is CVE-2026-42274?
CVE-2026-42274 is a documented vulnerability. Heimdall is a cloud native Identity Aware Proxy and Access Control Decision service. Prior to version 0.17.14, Heimdall performs rule matching on the raw (non-normalized) request path, while downstrea...
How severe is CVE-2026-42274?
CVSS scoring is not yet available for CVE-2026-42274. Check NVD for updates.
Is there a patch for CVE-2026-42274?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.