WhisperX tag archive

#CVE-2026-33186

This page collects WhisperX intelligence signals tagged #CVE-2026-33186. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (19)

The Lab · 2026-03-25 16:27:20 · GitHub Issues

1. gRPC-Go Security Flaw Exposed: Authorization Bypass via HTTP/2 Path Header

A critical security vulnerability in the widely-used gRPC-Go library has been disclosed, exposing servers to potential authorization bypass. The flaw, tracked as CVE-2026-33186, stems from improper input validation of the HTTP/2 `:path` pseudo-header. This weakness allows attackers to potentially circumvent intended ac...

The Lab · 2026-03-25 19:27:30 · GitHub Issues

2. gRPC-Go < v1.79.3 曝授权绕过漏洞 (CVE-2026-33186),依赖项目面临安全风险

一个存在于 gRPC-Go 库中的关键安全漏洞(CVE-2026-33186)已被确认,该漏洞允许攻击者在特定条件下绕过服务的授权控制。该漏洞影响所有低于 v1.79.3 版本的 `google.golang.org/grpc` 库。其核心风险在于,攻击者可以通过发送畸形的 HTTP/2 请求,利用对 `:path` 伪标头验证不当的缺陷,使请求路径绕过基于路径的授权策略检查,但仍能被路由到预期的处理程序。 该漏洞的利用条件较为苛刻,需要同时满足多个前提:服务必须运行 gRPC-Go 服务器;使用了基于路径的授权机制(如 `google.golang.org/grpc/authz` 或自定义拦截器);授权策略中包含了针对规范路径(...

The Lab · 2026-03-26 01:27:32 · GitHub Issues

3. gRPC-Go v1.79.3 Patches Critical Authorization Bypass in HTTP/2 Path Validation

A critical security flaw in the core routing logic of Google's gRPC-Go library has been patched, exposing servers to potential authorization bypass. The vulnerability, tracked as CVE-2026-33186, stems from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was found to be overly permissiv...

The Lab · 2026-03-26 01:27:34 · GitHub Issues

4. gRPC-Go v1.79.3 Patches Critical Authorization Bypass in HTTP/2 Path Validation

A critical security vulnerability in the core routing logic of gRPC-Go has been patched, exposing servers to potential authorization bypass. The flaw, tracked as CVE-2026-33186, stems from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server's routing was found to be excessively permissive,...

The Lab · 2026-03-26 18:27:21 · GitHub Issues

5. gRPC-Go Security Alert: Authorization Bypass Flaw in HTTP/2 Path Validation (CVE-2026-33186)

A critical security vulnerability in the widely-used gRPC-Go library exposes servers to authorization bypass attacks. The flaw, tracked as CVE-2026-33186, stems from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server's routing logic was found to be dangerously lenient, incorrectly accepti...

The Lab · 2026-03-26 18:27:24 · GitHub Issues

6. gRPC-Go 爆出高危授权绕过漏洞 CVE-2026-33186,服务器路径验证存在缺陷

谷歌 gRPC-Go 框架的核心服务器组件中发现一个高危授权绕过漏洞(CVE-2026-33186),源于对 HTTP/2 `:path` 伪头(pseudo-header)的输入验证不当。该漏洞允许攻击者通过构造特定的恶意请求路径,绕过服务端的路由逻辑,可能导致未授权的数据访问或服务调用。漏洞的根本原因在于 gRPC-Go 服务器的路由逻辑过于宽松,接受了不符合规范的 `:path` 头值。 此次安全更新通过自动化的依赖管理工具 Renovate 以拉取请求(PR)形式发布,将 `google.golang.org/grpc` 模块从存在漏洞的 v1.58.3 版本紧急升级至修复后的 v1.79.3 版本。更新跨度巨大,涉及多个...

The Lab · 2026-03-26 20:27:28 · GitHub Issues

7. gRPC-Go Security Patch: Critical Authorization Bypass in HTTP/2 Path Validation (CVE-2026-33186)

A critical security vulnerability in the widely-used gRPC-Go library exposes servers to authorization bypass attacks. The flaw, tracked as CVE-2026-33186, stems from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server's routing logic was found to be dangerously lenient, incorrectly accepti...

The Lab · 2026-03-27 13:27:25 · GitHub Issues

8. Istio 1.21.6 Patches Critical gRPC-Go Flaw (CVE-2026-33186) Enabling Authorization Bypass

The Istio service mesh has released a critical security patch for version 1.21.6, addressing a severe vulnerability in the underlying gRPC-Go library. The flaw, tracked as CVE-2026-33186, allows for a complete authorization bypass. The exploit hinges on a missing leading slash in the HTTP/2 `:path` pseudo-header, which...

The Lab · 2026-03-30 20:27:34 · GitHub Issues

9. gRPC-Go Security Advisory: HTTP/2 Path Validation Flaw Enables Authorization Bypass (CVE-2026-33186)

A critical security flaw in the core routing logic of gRPC-Go servers has been disclosed, enabling potential authorization bypass. The vulnerability, tracked as CVE-2026-33186, stems from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server's routing was found to be excessively permissive, ...

The Lab · 2026-03-31 09:27:06 · GitHub Issues

10. gRPC-Go Security Advisory: Authorization Bypass Flaw in HTTP/2 Path Validation (CVE-2026-33186)

A critical security vulnerability in the widely-used gRPC-Go library exposes servers to authorization bypass attacks. The flaw, tracked as CVE-2026-33186, stems from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server's routing logic was found to be excessively lenient, incorrectly accepti...

The Lab · 2026-04-01 23:27:08 · GitHub Issues

11. gRPC-Go Security Advisory: HTTP/2 Path Validation Flaw Opens Door to Authorization Bypass (CVE-2026-33186)

A critical security flaw in the core routing logic of Google's gRPC-Go library has been disclosed, exposing servers to potential authorization bypass. The vulnerability, tracked as CVE-2026-33186, stems from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server's routing was found to be exce...

The Lab · 2026-04-02 22:27:08 · GitHub Issues

12. gRPC-Go 安全更新:CVE-2026-33186 漏洞暴露授权绕过风险

谷歌 gRPC-Go 框架的一个关键安全漏洞已被披露,该漏洞允许攻击者通过构造特定的 HTTP/2 请求路径绕过服务端授权检查。漏洞编号为 CVE-2026-33186,其核心问题在于框架在处理 HTTP/2 请求的 `:path` 伪头部字段时,未能正确处理缺少前导斜杠的路径。这种输入验证缺陷使得恶意请求可能被错误地路由到未受保护的内部端点,从而绕过预期的身份验证和授权机制,对依赖 gRPC 进行服务间通信的微服务架构构成直接威胁。 该漏洞影响广泛使用 gRPC-Go 的 Go 语言后端服务。开源安全公告 GHSA-p77j-4mvh-x3m3 和 Go 官方漏洞数据库条目 GO-2026-4762 均已收录此问题。作为响应,g...

The Lab · 2026-04-07 13:27:19 · GitHub Issues

13. Critical gRPC-Go Vulnerability (CVE-2026-33186) Exposes Kuadrant and Related Repos to Authorization Bypass

A critical vulnerability in the `google.golang.org/grpc` library, tracked as CVE-2026-33186, exposes multiple Go-based repositories within the Kuadrant ecosystem to potential authorization bypass. The flaw, rated with a CVSS score of 9.1, allows gRPC-Go servers to accept HTTP/2 requests where the `:path` header omits t...

The Lab · 2026-04-13 02:22:32 · GitHub Issues

14. gRPC-Go 安全漏洞 CVE-2026-33186:路径前缀缺失或导致授权绕过

谷歌 gRPC-Go 框架中发现一个关键安全漏洞,编号为 CVE-2026-33186。该漏洞源于框架在处理 HTTP/2 请求的 `:path` 伪头部时,未能强制要求路径以正斜杠 (`/`) 开头。攻击者可能利用此缺陷,构造特定请求绕过预期的授权检查,从而获得对受保护服务或端点的未授权访问。这一缺陷直接威胁到所有依赖 gRPC 进行微服务间通信的现代云原生架构的安全边界。 漏洞影响 `google.golang.org/grpc` 库的多个版本。在开源项目的依赖更新中,已观察到从 v1.58.3、v1.71.1、v1.66.0 等多个旧版本紧急升级至修复版本 v1.79.3 的集中行动。更新涉及 `require`(直接依赖)...

The Lab · 2026-04-16 13:23:07 · GitHub Issues

15. gRPC-Go v1.79.3 Patches Critical HTTP/2 Authorization Bypass (CVE-2026-33186)

A critical security flaw in the widely used gRPC-Go library has been patched, exposing servers to potential authorization bypass attacks. The vulnerability, tracked as CVE-2026-33186, stems from improper input validation of the HTTP/2 `:path` pseudo-header by the gRPC-Go server. This leniency could allow a malicious cl...

The Lab · 2026-04-22 04:22:50 · GitHub Issues

16. gRPC-Go 安全更新:CVE-2026-33186 授权绕过漏洞修复 (v1.79.3)

Google 的 gRPC-Go 库发布紧急安全更新,修复一个关键的授权绕过漏洞。该漏洞被追踪为 CVE-2026-33186,源于对 HTTP/2 `:path` 伪头的不当输入验证。攻击者可能通过构造缺少前导斜杠的路径,绕过服务端配置的授权检查,从而未经验证地访问受保护的 gRPC 服务端点。此漏洞直接影响所有使用受影响版本 gRPC-Go 库构建的微服务、API 网关和云原生应用。 此次更新将模块版本从 v1.74.2 提升至 v1.79.3。漏洞详情已在 GitHub 安全公告 GHSA-p77j-4mvh-x3m3 中披露。该问题被归类为授权绕过,属于高严重性缺陷,因为它直接威胁到基于 gRPC 的系统的安全边界。依赖自...

The Lab · 2026-05-04 18:54:14 · GitHub Issues

17. Red Hat's Stolostron GlobalHub 1.5 Hit by Four Critical Go Dependency Vulnerabilities Requiring Urgent Patch

Security researchers have identified four critical vulnerabilities embedded within the Go dependency chain of Red Hat's multicluster-globalhub version 1.5, specifically targeting the Stolostron/glo-grafana repository. The flaws, spanning denial-of-service vectors and authentication bypass mechanisms, affect core crypto...

The Lab · 2026-05-13 09:18:29 · Mastodon:mastodon.social:#infosec

18. CVE-2026-33186 : un slash manquant dans le chemin HTTP/2 suffit à contourner l'autorisation gRPC-Go

Une vulnérabilité critique touche gRPC-Go. Selon les données disponibles, l'absence d'un slash dans l'en-tête `:path` HTTP/2 permettrait de contourner l'ensemble des mécanismes d'autorisation du framework. La faille, baptisée CVE-2026-33186, affiche un CVSS de 9.1, traduisant une gravité élevée dans l'évaluation offici...

The Lab · 2026-05-14 01:48:28 · GitHub Issues

19. Critical Authorization Bypass in gRPC-Go Forces Emergency Patch to v1.79.3

A critical authorization bypass vulnerability in google.golang.org/grpc has been patched, requiring immediate upgrades from v1.75.1 to v1.79.3. Tracked as CVE-2026-33186 and GHSA-p77j-4mvh-x3m3, the flaw allows attackers to bypass authorization checks through improper validation of the HTTP/2 `:path` pseudo-header. Th...