Istio versions 1.2.10 (End of Life) and prior, 1.3 through 1.3.7, and 1.4 through 1.4.3 allows authentication bypass. The Authentication Policy exact-path matching logic can allow unauthorized access to HTTP paths even if they are configured to be only accessed after presenting a valid JWT token. For example, an attacker can add a ? or # character to a URI that would otherwise satisfy an exact-path match.
Cite this page
CVE-2020-8595. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2020-8595
Use CWE-287, Istio vendor hub and Istio product page to widen CVE-2020-8595 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2023-44487, CVE-2026-31837 and CVE-2021-39156 for nearby disclosures in the same product family.