GHSA-85gx-3qv6-4463

Suggest an improvement
Source
https://github.com/advisories/GHSA-85gx-3qv6-4463
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-85gx-3qv6-4463/GHSA-85gx-3qv6-4463.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-85gx-3qv6-4463
Published
2026-04-17T22:20:40Z
Modified
2026-04-17T22:33:38.975279Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Dapr: Service Invocation path traversal ACL bypass
Details

Summary

A vulnerability has been found in Dapr that allows bypassing access control policies for service invocation using reserved URL characters and path traversal sequences in method paths. The ACL normalized the method path independently from the dispatch layer, so the ACL evaluated one path while the target application received a different one.

Users who have configured access control policies for service invocation are strongly encouraged to upgrade Dapr to the respective patch version 1.17.5, 1.16.14, and 1.15.14.

Impact

This vulnerability impacts Dapr users who have configured access control policies for service invocation. An attacker who can reach the Dapr HTTP or gRPC API could:

  • Use encoded path traversal (ex: admin%2F..%2Fpublic) to reach an allowed path while the method started from a denied prefix.
  • Use encoded fragment (%23) or query (%3F) characters to cause the ACL to evaluate a different path than what was delivered to the target application.

Patches

Users should upgrade immediately to their respective Dapr version 1.17.5, 1.16.14, and 1.15.14.

Details

Dapr supports access control policies for service invocation, which allow operators to restrict which methods an application is permitted to call on a target app. When a request arrives, Dapr evaluates the method path against the configured policy before dispatching to the target.

Prior to this fix, the ACL and the dispatch layer normalized the method path independently. The ACL used purell.NormalizeURLString, which decoded %XX sequences, resolved ../, and stripped # and ? as URL delimiters. The dispatch layer used the raw method string. This mismatch meant the ACL authorized one path while the target application received a different one.

For example, a method of admin%2F..%2Fpublic was normalized by the ACL to public (allowed), but the target application received admin/../public.

The gRPC API was the more dangerous vector because gRPC passes method strings raw — #, ?, ../, and control characters were all delivered literally with no client-side sanitization.

References

This PR signaled to us about the CVE, special thanks to @dbconfession78 for the efforts here and the original PR.

Database specific
{
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-22",
        "CWE-284"
    ],
    "severity": "HIGH",
    "github_reviewed_at": "2026-04-17T22:20:40Z",
    "nvd_published_at": null
}
References

Affected packages

Go / github.com/dapr/dapr

Package

Name
github.com/dapr/dapr
View open source insights on deps.dev
Purl
pkg:golang/github.com/dapr/dapr

Affected ranges

Type
SEMVER
Events
Introduced
1.17.0-rc.1
Fixed
1.17.5

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-85gx-3qv6-4463/GHSA-85gx-3qv6-4463.json"

Go / github.com/dapr/dapr

Package

Name
github.com/dapr/dapr
View open source insights on deps.dev
Purl
pkg:golang/github.com/dapr/dapr

Affected ranges

Type
SEMVER
Events
Introduced
1.16.0-rc.1
Fixed
1.16.14

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-85gx-3qv6-4463/GHSA-85gx-3qv6-4463.json"

Go / github.com/dapr/dapr

Package

Name
github.com/dapr/dapr
View open source insights on deps.dev
Purl
pkg:golang/github.com/dapr/dapr

Affected ranges

Type
SEMVER
Events
Introduced
1.3.0
Fixed
1.15.14

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-85gx-3qv6-4463/GHSA-85gx-3qv6-4463.json"