{"api_version":"1","generated_at":"2026-05-13T00:20:36+00:00","cve":"CVE-2026-41491","urls":{"html":"https://cve.report/CVE-2026-41491","api":"https://cve.report/api/cve/CVE-2026-41491.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-41491","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-41491"},"summary":{"title":"Dapr: Service Invocation path traversal ACL bypass","description":"Dapr is a portable, event-driven, runtime for building distributed applications across cloud and edge. From versions 1.3.0 to before 1.15.14, 1.16.0-rc.1 to before 1.16.14, and 1.17.0-rc.1 to before 1.17.5, a vulnerability has been found in Dapr that allows bypassing access control policies for service invocation using reserved URL characters and path traversal sequences in method paths. The ACL normalized the method path independently from the dispatch layer, so the ACL evaluated one path while the target application received a different one. This issue has been patched in versions 1.15.14, 1.16.14, and 1.17.5.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-05-08 14:16:33","updated_at":"2026-05-12 14:47:26"},"problem_types":["CWE-22","CWE-284","NVD-CWE-noinfo","CWE-22 CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","CWE-284 CWE-284: Improper Access Control"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"8.1","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"8.1","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","version":"3.1"}}],"references":[{"url":"https://github.com/dapr/dapr/pull/9589","name":"https://github.com/dapr/dapr/pull/9589","refsource":"security-advisories@github.com","tags":["Issue Tracking","Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/dapr/dapr/security/advisories/GHSA-85gx-3qv6-4463","name":"https://github.com/dapr/dapr/security/advisories/GHSA-85gx-3qv6-4463","refsource":"security-advisories@github.com","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-41491","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-41491","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"dapr","product":"dapr","version":"affected >= 1.3.0, < 1.15.14","platforms":[]},{"source":"CNA","vendor":"dapr","product":"dapr","version":"affected >= 1.16.0-rc.1, < 1.16.14","platforms":[]},{"source":"CNA","vendor":"dapr","product":"dapr","version":"affected >= 1.17.0-rc.1, < 1.17.5","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"41491","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linuxfoundation","cpe5":"dapr","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"41491","cve":"CVE-2026-41491","epss":"0.000290000","percentile":"0.083850000","score_date":"2026-05-12","updated_at":"2026-05-13 00:11:54"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-41491","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2026-05-08T13:58:49.341365Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-05-08T13:58:57.832Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"dapr","vendor":"dapr","versions":[{"status":"affected","version":">= 1.3.0, < 1.15.14"},{"status":"affected","version":">= 1.16.0-rc.1, < 1.16.14"},{"status":"affected","version":">= 1.17.0-rc.1, < 1.17.5"}]}],"descriptions":[{"lang":"en","value":"Dapr is a portable, event-driven, runtime for building distributed applications across cloud and edge. From versions 1.3.0 to before 1.15.14, 1.16.0-rc.1 to before 1.16.14, and 1.17.0-rc.1 to before 1.17.5, a vulnerability has been found in Dapr that allows bypassing access control policies for service invocation using reserved URL characters and path traversal sequences in method paths. The ACL normalized the method path independently from the dispatch layer, so the ACL evaluated one path while the target application received a different one. This issue has been patched in versions 1.15.14, 1.16.14, and 1.17.5."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-22","description":"CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-284","description":"CWE-284: Improper Access Control","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-08T13:11:13.128Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/dapr/dapr/security/advisories/GHSA-85gx-3qv6-4463","tags":["x_refsource_CONFIRM"],"url":"https://github.com/dapr/dapr/security/advisories/GHSA-85gx-3qv6-4463"},{"name":"https://github.com/dapr/dapr/pull/9589","tags":["x_refsource_MISC"],"url":"https://github.com/dapr/dapr/pull/9589"}],"source":{"advisory":"GHSA-85gx-3qv6-4463","discovery":"UNKNOWN"},"title":"Dapr: Service Invocation path traversal ACL bypass"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-41491","datePublished":"2026-05-08T13:11:13.128Z","dateReserved":"2026-04-20T16:14:19.008Z","dateUpdated":"2026-05-08T13:58:57.832Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-08 14:16:33","lastModifiedDate":"2026-05-12 14:47:26","problem_types":["CWE-22","CWE-284","NVD-CWE-noinfo","CWE-22 CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","CWE-284 CWE-284: Improper Access Control"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:linuxfoundation:dapr:*:*:*:*:*:*:*:*","versionStartIncluding":"1.3.0","versionEndExcluding":"1.15.14","matchCriteriaId":"3ECEE527-032B-4C2D-8132-3A62F1ABA44F"},{"vulnerable":true,"criteria":"cpe:2.3:a:linuxfoundation:dapr:*:*:*:*:*:*:*:*","versionStartIncluding":"1.16.0","versionEndExcluding":"1.16.14","matchCriteriaId":"1DCAE52F-25F5-4675-B977-A65F5DB5D760"},{"vulnerable":true,"criteria":"cpe:2.3:a:linuxfoundation:dapr:*:*:*:*:*:*:*:*","versionStartIncluding":"1.17.0","versionEndExcluding":"1.17.5","matchCriteriaId":"81EA1A94-530C-4DCB-8D71-BB6531F4C09A"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"41491","Ordinal":"1","Title":"Dapr: Service Invocation path traversal ACL bypass","CVE":"CVE-2026-41491","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"41491","Ordinal":"1","NoteData":"Dapr is a portable, event-driven, runtime for building distributed applications across cloud and edge. From versions 1.3.0 to before 1.15.14, 1.16.0-rc.1 to before 1.16.14, and 1.17.0-rc.1 to before 1.17.5, a vulnerability has been found in Dapr that allows bypassing access control policies for service invocation using reserved URL characters and path traversal sequences in method paths. The ACL normalized the method path independently from the dispatch layer, so the ACL evaluated one path while the target application received a different one. This issue has been patched in versions 1.15.14, 1.16.14, and 1.17.5.","Type":"Description","Title":"Dapr: Service Invocation path traversal ACL bypass"}]}}}