Generated remediation guidance and an executive summary. No account required.
Envoy is a cloud-native high-performance edge/middle/service proxy. A vulnerability has been identified in Envoy that allows malicious attackers to inject unexpected content into access logs. This is achieved by exploiting the lack of validation for the `REQUESTED_SERVER_NAME` field for access loggers. This issue has been addressed in versions 1.31.2, 1.30.6, 1.29.9, and 1.28.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Cite this page
CVE-2024-45808. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2024-45808
Use CWE-117, Envoyproxy vendor hub and Envoy product page to widen CVE-2024-45808 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-26308, CVE-2025-54588 and CVE-2025-62409 for nearby disclosures in the same product family.