{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T12:53:10.765","vulnerabilities":[{"cve":{"id":"CVE-2025-25294","sourceIdentifier":"security-advisories@github.com","published":"2025-03-06T19:15:27.267","lastModified":"2025-09-04T13:52:34.993","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. In all Envoy Gateway versions prior to 1.2.7 and 1.3.1 a default Envoy Proxy access log configuration is used. This format is vulnerable to log injection attacks. If the attacker uses a specially crafted user-agent which performs json injection, then he could add and overwrite fields to the access log. This vulnerability is fixed in 1.3.1 and 1.2.7. One can overwrite the old text based default format with JSON formatter by modifying the \"EnvoyProxy.spec.telemetry.accessLog\" setting."},{"lang":"es","value":"Envoy Gateway es un proyecto de código abierto para administrar Envoy Proxy como una puerta de enlace de aplicaciones independiente o basada en Kubernetes. En todas las versiones de Envoy Gateway anteriores a 1.2.7 y 1.3.1 se utiliza una configuración de registro de acceso de Envoy Proxy predeterminada. Este formato es vulnerable a ataques de inyección de registros. Si el atacante utiliza un agente de usuario especialmente manipulado que realiza una inyección JSON, podría agregar y sobrescribir campos en el registro de acceso. Esta vulnerabilidad se solucionó en 1.3.1 y 1.2.7. Se puede sobrescribir el antiguo formato predeterminado basado en texto con el formateador JSON modificando la configuración \"EnvoyProxy.spec.telemetry.accessLog\"."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-117"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:envoyproxy:gateway:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.7","matchCriteriaId":"6993284B-B381-40CA-83B2-A03F3AB4664A"},{"vulnerable":true,"criteria":"cpe:2.3:a:envoyproxy:gateway:*:*:*:*:*:*:*:*","versionStartIncluding":"1.3.0","versionEndExcluding":"1.3.1","matchCriteriaId":"200AFC8A-EE02-46F6-A8F2-AE6D222921BE"}]}]}],"references":[{"url":"https://github.com/envoyproxy/gateway/commit/8f48f5199cf1bbb9a8ac0695c5171bfef6c9198a","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/envoyproxy/gateway/security/advisories/GHSA-mf24-chxh-hmvj","source":"security-advisories@github.com","tags":["Mitigation","Third Party Advisory"]}]}}]}