Improper Authorization in google.golang.org/grpc
CVE-2026-33186
- google.golang.org/grpc
Summary
In versions prior to 1.79.3, gRPC-Go contains an authorisation bypass caused by improper input validation of the HTTP/2: path pseudo-header. The server accepts non-canonical paths missing the required leading slash (e.g., Service/Method instead of /Service/Method), and although routing succeeds, authorisation interceptors--including grpc/authz--evaluate the raw, non-canonical path. This causes canonical "deny" rules to fail to match and may allow unauthorized requests when a fallback "allow" rule exists. The issue is fixed in version 1.79.3.
- LOW
- NETWORK
- HIGH
- UNCHANGED
- NONE
- NONE
- HIGH
- NONE
CWE-285 - Improper Authorization
The software does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
References
Advisory Timeline
- Published