Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/envoyproxy/envoy
  4. ›
  5. CVE-2025-66220

CVE-2025-66220: Envoy's TLS certificate matcher for `match_typed_subject_alt_names` may incorrectly treat certificates containing an embedded null byte

December 5, 2025

Envoy’s mTLS certificate matcher for match_typed_subject_alt_names may incorrectly treat certificates containing an embedded null byte (\0) inside an OTHERNAME SAN value as valid matches.

References

  • github.com/advisories/GHSA-rwjg-c3h2-f57p
  • github.com/envoyproxy/envoy
  • github.com/envoyproxy/envoy/security/advisories/GHSA-rwjg-c3h2-f57p
  • nvd.nist.gov/vuln/detail/CVE-2025-66220

Code Behaviors & Features

Detect and mitigate CVE-2025-66220 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.33.13, all versions starting from 1.34.0 before 1.34.11, all versions starting from 1.35.0 before 1.35.7, all versions starting from 1.36.0 before 1.36.3

Fixed versions

  • 1.36.3
  • 1.35.7
  • 1.34.11
  • 1.33.13

Solution

Upgrade to versions 1.33.13, 1.34.11, 1.35.7, 1.36.3 or above.

Impact 5 MEDIUM

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-170: Improper Null Termination

Source file

go/github.com/envoyproxy/envoy/CVE-2025-66220.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sun, 07 Dec 2025 00:19:25 +0000.