#VU114763 Insufficient session expiration in envoy - CVE-2025-55162
Published: September 3, 2025
envoy
Cloud Native Computing Foundation
Description
The vulnerability allows a attacker to compromise victim's session.
The vulnerability exists due to insufficient session expiration issue in the Envoy OAuth2 filter. When configured with __Secure- or __Host- prefixed cookie names, the filter fails to append the required Secure attribute to the Set-Cookie header during deletion. As a result the cookie is never deleted when the user clicks on the logout button. An attacker with physical access to the victim's browser can gain unauthorized access to the original user's account and data.