Description

Dapr is a portable, event-driven, runtime for building distributed applications across cloud and edge. From versions 1.3.0 to before 1.15.14, 1.16.0-rc.1 to before 1.16.14, and 1.17.0-rc.1 to before 1.17.5, a vulnerability has been found in Dapr that allows bypassing access control policies for service invocation using reserved URL characters and path traversal sequences in method paths. The ACL normalized the method path independently from the dispatch layer, so the ACL evaluated one path while the target application received a different one. This issue has been patched in versions 1.15.14, 1.16.14, and 1.17.5.

INFO

Published Date :

2026-05-08T13:11:13.128Z

Last Modified :

2026-05-08T13:58:57.832Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-41491 vulnerability.

Vendors Products
Dapr
  • Dapr
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-41491.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact