CVE-2026-33186: RCE — Critical — Patch Now [PoC]
CVE-2026-33186
gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go serve...
Overview
A critical security flaw, tracked as CVE-2026-33186, has been discovered in gRPC-Go, the popular Go language implementation of the gRPC framework. This vulnerability is an authorization bypass that could allow unauthorized access to protected server methods. It affects versions prior to 1.79.3.
Vulnerability Details
The vulnerability stems from improper validation of the HTTP/2 :path pseudo-header by the gRPC-Go server. The server incorrectly accepted requests where the path omitted the mandatory leading slash (for example, accepting Service/Method instead of the correct /Service/Method).
While the server could still route these malformed requests to the correct handler, the security checks failed. Authorization interceptors-including the official grpc/authz package-evaluated this raw, non-canonical path string. Consequently, any “deny” rule defined using the proper path format (starting with /) would not match the incoming request. If a fallback “allow” rule was present in the security policy, the request would bypass authorization entirely.
This flaw is exploitable by an attacker capable of sending raw HTTP/2 frames with a malformed :path header directly to the gRPC server.
Impact and Risk
The impact is severe for affected configurations. An attacker could invoke gRPC methods that are explicitly intended to be blocked by security policy, potentially leading to data exposure, unauthorized actions, or privilege escalation.
Your system is at risk if:
- It runs a gRPC-Go server version earlier than 1.79.3.
- It uses path-based authorization interceptors (the official RBAC package or custom interceptors using
info.FullMethod). - Its security policy contains specific “deny” rules for canonical paths but has a default “allow” rule for other requests.
The vulnerability has been assigned a CVSS score of 9.1 (CRITICAL).
Remediation and Mitigation
The primary and most secure action is to upgrade gRPC-Go to version 1.79.3 or later. This fix ensures any request with a :path lacking a leading slash is immediately rejected with an “Unimplemented” error before it reaches authorization logic.
If immediate upgrading is not possible, consider these mitigations:
- Use a Validating Interceptor: Deploy a custom server interceptor that normalizes or rejects non-canonical paths before the authorization interceptor runs.
- Infrastructure-Level Normalization: Configure a reverse proxy or load balancer in front of the gRPC server to normalize or filter HTTP/2 paths.
- Policy Hardening: Review and rewrite authorization policies to avoid relying solely on a default “allow” rule. Adopt a default-deny posture where feasible.
Staying current with patches is crucial for security. For examples of active exploitation, see related reports on the DarkSword iOS Exploit Kit and recent Google Chrome zero-days. For other authorization-related flaws, review the ‘LeakyLooker’ findings in Google Looker Studio.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-33186?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Public PoC References
Unverified third-party code
These repositories are publicly listed on GitHub and have not been audited by Yazoul Security. They may contain malware, backdoors, destructive payloads, or operational security risks (telemetry, exfiltration). Treat them as hostile binaries. Inspect source before execution. Run only in isolated, disposable lab environments (offline VM, no credentials, no production data).
Authorized use only. This information is provided for defensive research, detection engineering, and patch validation. Using exploit code against systems you do not own or do not have explicit written permission to test is illegal in most jurisdictions and violates Yazoul's terms of use.
| Repository | Stars |
|---|---|
| JohannesLks/CVE-2026-33186 gRPC-Go RBAC Authorization Policy Bypass via Missing `:path` Slash (Auth Bypass) | ★ 0 |
Showing 1 of 1 known references. Source: nomi-sec/PoC-in-GitHub.
Related Advisories
Improper authorization in Azure AI Foundry allows an unauthorized attacker to elevate privileges over a network....
Improper authorization in Microsoft Azure Kubernetes Service allows an unauthorized attacker to elevate privileges over a network....
Hot Chocolate is an open-source GraphQL server. Prior to versions 12.22.7, 13.9.16, 14.3.1, and 15.1.14, Hot Chocolate's recursive descent parser `Utf8GraphQLParser` has no recursion depth limit. A cr...
ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the database backup restore functionality extracts uploaded archive contents and copies files from the Images/ directo...