Anonymous Intelligence Signal

gRPC-Go Security Advisory: Authorization Bypass Flaw in HTTP/2 Path Validation (CVE-2026-33186)

human The Lab unverified 2026-03-31 09:27:06 Source: GitHub Issues

A critical security vulnerability in the widely-used gRPC-Go library exposes servers to authorization bypass attacks. The flaw, tracked as CVE-2026-33186, stems from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server's routing logic was found to be excessively lenient, incorrectly accepting requests where the mandatory leading slash in the path was omitted. This deviation from the HTTP/2 specification creates a direct path for unauthorized access.

The vulnerability is an authorization bypass resulting from this flawed validation. It impacts any service using a vulnerable version of the `google.golang.org/grpc` library. The issue was identified in the library's core server handling, where a request path formatted as `Service/Method` (without the leading `/`) would be incorrectly processed, potentially allowing an attacker to reach endpoints they should not have access to, bypassing intended authorization controls.

The disclosure has triggered immediate update pressure across the software supply chain. Dependency management bots like Renovate are already issuing pull requests to update from versions like v1.71.0 to the patched v1.79.3. This is a supply-chain-level event, forcing thousands of downstream projects and microservices to audit and patch their dependencies. The flaw's presence in a fundamental communication layer for cloud-native and microservices architectures significantly amplifies its potential blast radius, necessitating urgent scrutiny by DevOps and security teams.