{"api_version":"1","generated_at":"2026-05-07T11:16:01+00:00","cve":"CVE-2026-41413","urls":{"html":"https://cve.report/CVE-2026-41413","api":"https://cve.report/api/cve/CVE-2026-41413.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-41413","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-41413"},"summary":{"title":"Istio Vulnerable to SSRF via RequestAuthentication jwksUri","description":"Istio is an open platform to connect, manage, and secure microservices. Prior to versions 1.28.6 and 1.29.2, when a RequestAuthentication resource is created with a jwksUri pointing to an internal service, istiod makes an unauthenticated HTTP GET request to that URL without filtering out localhost or link local ips. This can result in sensitive data being distributed to Envoy proxies via xDS configuration. This issue has been patched in versions 1.28.6 and 1.29.2.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-05-07 06:16:04","updated_at":"2026-05-07 06:16:04"},"problem_types":["CWE-918","CWE-918 CWE-918: Server-Side Request Forgery (SSRF)"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"5","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N","baseScore":5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"5","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N","version":"3.1"}}],"references":[{"url":"https://github.com/istio/istio/security/advisories/GHSA-fgw5-hp8f-xfhc","name":"https://github.com/istio/istio/security/advisories/GHSA-fgw5-hp8f-xfhc","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/istio/istio/releases/tag/1.28.6","name":"https://github.com/istio/istio/releases/tag/1.28.6","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/istio/istio/releases/tag/1.29.2","name":"https://github.com/istio/istio/releases/tag/1.29.2","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-41413","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-41413","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"istio","product":"istio","version":"affected < 1.28.6","platforms":[]},{"source":"CNA","vendor":"istio","product":"istio","version":"affected >= 1.29.0-alpha.0, < 1.29.2","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"product":"istio","vendor":"istio","versions":[{"status":"affected","version":"< 1.28.6"},{"status":"affected","version":">= 1.29.0-alpha.0, < 1.29.2"}]}],"descriptions":[{"lang":"en","value":"Istio is an open platform to connect, manage, and secure microservices. Prior to versions 1.28.6 and 1.29.2, when a RequestAuthentication resource is created with a jwksUri pointing to an internal service, istiod makes an unauthenticated HTTP GET request to that URL without filtering out localhost or link local ips. This can result in sensitive data being distributed to Envoy proxies via xDS configuration. This issue has been patched in versions 1.28.6 and 1.29.2."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-918","description":"CWE-918: Server-Side Request Forgery (SSRF)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-07T04:18:32.040Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/istio/istio/security/advisories/GHSA-fgw5-hp8f-xfhc","tags":["x_refsource_CONFIRM"],"url":"https://github.com/istio/istio/security/advisories/GHSA-fgw5-hp8f-xfhc"},{"name":"https://github.com/istio/istio/releases/tag/1.28.6","tags":["x_refsource_MISC"],"url":"https://github.com/istio/istio/releases/tag/1.28.6"},{"name":"https://github.com/istio/istio/releases/tag/1.29.2","tags":["x_refsource_MISC"],"url":"https://github.com/istio/istio/releases/tag/1.29.2"}],"source":{"advisory":"GHSA-fgw5-hp8f-xfhc","discovery":"UNKNOWN"},"title":"Istio Vulnerable to SSRF via RequestAuthentication jwksUri"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-41413","datePublished":"2026-05-07T04:18:32.040Z","dateReserved":"2026-04-20T15:32:33.812Z","dateUpdated":"2026-05-07T04:18:32.040Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-07 06:16:04","lastModifiedDate":"2026-05-07 06:16:04","problem_types":["CWE-918","CWE-918 CWE-918: Server-Side Request Forgery (SSRF)"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N","baseScore":5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.1,"impactScore":1.4}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"41413","Ordinal":"1","Title":"Istio Vulnerable to SSRF via RequestAuthentication jwksUri","CVE":"CVE-2026-41413","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"41413","Ordinal":"1","NoteData":"Istio is an open platform to connect, manage, and secure microservices. Prior to versions 1.28.6 and 1.29.2, when a RequestAuthentication resource is created with a jwksUri pointing to an internal service, istiod makes an unauthenticated HTTP GET request to that URL without filtering out localhost or link local ips. This can result in sensitive data being distributed to Envoy proxies via xDS configuration. This issue has been patched in versions 1.28.6 and 1.29.2.","Type":"Description","Title":"Istio Vulnerable to SSRF via RequestAuthentication jwksUri"}]}}}