CVE-2026-33186

Public on 2026-03-20
Modified on 2026-03-25
Description
gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated the raw, non-canonical path string. Consequently, "deny" rules defined using canonical paths (starting with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback "allow" rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific "deny" rules for canonical paths but allows other requests by default (a fallback "allow" rule). The vulnerability is exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching authorization interceptors or handlers with a non-canonical path string. While upgrading is the most secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy hardening.
Severity
Important severity
Important
See what this means
CVSS v3 Base Score
8.1
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 2 - Core amazon-cloudwatch-agent 2026-04-14 ALAS2-2026-3248 Fixed
Amazon Linux 2023 amazon-cloudwatch-agent 2026-04-13 ALAS2023-2026-1572 Fixed
Amazon Linux 2 - Aws-nitro-enclaves-cli Extra containerd 2026-02-19 ALAS2NITRO-ENCLAVES-2026-092 Fixed
Amazon Linux 2 - Docker Extra containerd 2026-04-14 ALAS2DOCKER-2026-104 Fixed
Amazon Linux 2 - Ecs Extra containerd 2026-04-14 ALAS2ECS-2026-102 Fixed
Amazon Linux 2023 containerd 2026-04-13 ALAS2023-2026-1534 Fixed
Amazon Linux 2023 credentials-fetcher 2026-04-13 ALAS2023-2026-1551 Fixed
Amazon Linux 2 - Core cri-tools 2026-04-14 ALAS2-2026-3236 Fixed
Amazon Linux 2 - Aws-nitro-enclaves-cli Extra docker 2026-04-14 ALAS2NITRO-ENCLAVES-2026-094 Fixed
Amazon Linux 2 - Docker Extra docker 2026-04-14 ALAS2DOCKER-2026-108 Fixed
Amazon Linux 2 - Ecs Extra docker 2026-04-14 ALAS2ECS-2026-106 Fixed
Amazon Linux 2 - Ecs Extra ecs-init 2026-04-14 ALAS2ECS-2026-101 Fixed
Amazon Linux 2023 ecs-init 2026-04-13 ALAS2023-2026-1552 Fixed
Amazon Linux 2 - Core nerdctl 2026-04-14 ALAS2-2026-3229 Fixed
Amazon Linux 2023 nerdctl 2026-04-13 ALAS2023-2026-1535 Fixed
Amazon Linux 2 - Docker Extra runfinch-finch 2026-04-14 ALAS2DOCKER-2026-106 Fixed
Amazon Linux 2023 runfinch-finch 2026-04-13 ALAS2023-2026-1548 Fixed
Amazon Linux 2 - Docker Extra soci-snapshotter 2026-04-14 ALAS2DOCKER-2026-107 Fixed
Amazon Linux 2023 soci-snapshotter 2026-04-13 ALAS2023-2026-1573 Fixed

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N