CVE-2025-46647 (GCVE-0-2025-46647)
Vulnerability from cvelistv5
Published
2025-07-02 11:08
Modified
2025-07-02 20:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-302 - Authentication Bypass by Assumed-Immutable Data
Summary
A vulnerability of plugin openid-connect in Apache APISIX.
This vulnerability will only have an impact if all of the following conditions are met:
1. Use the openid-connect plugin with introspection mode
2. The auth service connected to openid-connect provides services to multiple issuers
3. Multiple issuers share the same private key and relies only on the issuer being different
If affected by this vulnerability, it would allow an attacker with a valid account on one of the issuers to log into the other issuer.
This issue affects Apache APISIX: until 3.12.0.
Users are recommended to upgrade to version 3.12.0 or higher.
References
► | URL | Tags | |||||
---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache APISIX |
Version: 0 ≤ |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-46647", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-02T20:47:18.458010Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-02T20:47:21.822Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache APISIX", "vendor": "Apache Software Foundation", "versions": [ { "lessThan": "3.12.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Tiernan Messmer" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA vulnerability of plugin\u0026nbsp;openid-connect in Apache APISIX.\u003c/p\u003eThis vulnerability will only have an impact if all of the following conditions are met:\u003cbr\u003e1. Use the openid-connect plugin with introspection mode\u003cbr\u003e2. The auth service connected to openid-connect provides services to multiple issuers\u003cbr\u003e3. Multiple issuers share the same private key and relies only on the issuer being different\u003cbr\u003e\u003cbr\u003e\u003cdiv\u003e\u003cdiv\u003eIf affected by this vulnerability, it would allow an attacker with a valid account on one of the issuers to log into the other issuer.\u003c/div\u003e\u003c/div\u003e\u003cbr\u003e\u003cp\u003eThis issue affects Apache APISIX: until 3.12.0.\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to version 3.12.0 or higher.\u003cbr\u003e\u003cbr\u003e\u003c/p\u003e" } ], "value": "A vulnerability of plugin\u00a0openid-connect in Apache APISIX.\n\nThis vulnerability will only have an impact if all of the following conditions are met:\n1. Use the openid-connect plugin with introspection mode\n2. The auth service connected to openid-connect provides services to multiple issuers\n3. Multiple issuers share the same private key and relies only on the issuer being different\n\nIf affected by this vulnerability, it would allow an attacker with a valid account on one of the issuers to log into the other issuer.\n\n\n\n\nThis issue affects Apache APISIX: until 3.12.0.\n\nUsers are recommended to upgrade to version 3.12.0 or higher." } ], "metrics": [ { "other": { "content": { "text": "important" }, "type": "Textual description of severity" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-302", "description": "CWE-302 Authentication Bypass by Assumed-Immutable Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-02T11:08:47.179Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://lists.apache.org/thread/yrpp2cd3o4qkxlrh421mq8gsrt0k4x0w" } ], "source": { "discovery": "UNKNOWN" }, "title": "Apache APISIX: improper validation of issuer from introspection discovery url in plugin openid-connect", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2025-46647", "datePublished": "2025-07-02T11:08:47.179Z", "dateReserved": "2025-04-26T15:02:23.758Z", "dateUpdated": "2025-07-02T20:47:21.822Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-46647\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2025-07-02T12:15:28.227\",\"lastModified\":\"2025-07-09T15:25:56.260\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability of plugin\u00a0openid-connect in Apache APISIX.\\n\\nThis vulnerability will only have an impact if all of the following conditions are met:\\n1. Use the openid-connect plugin with introspection mode\\n2. The auth service connected to openid-connect provides services to multiple issuers\\n3. Multiple issuers share the same private key and relies only on the issuer being different\\n\\nIf affected by this vulnerability, it would allow an attacker with a valid account on one of the issuers to log into the other issuer.\\n\\n\\n\\n\\nThis issue affects Apache APISIX: until 3.12.0.\\n\\nUsers are recommended to upgrade to version 3.12.0 or higher.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad del complemento openid-connect en Apache APISIX. Esta vulnerabilidad solo tendr\u00e1 impacto si se cumplen todas las siguientes condiciones: 1. Usar el complemento openid-connect con modo de introspecci\u00f3n. 2. El servicio de autenticaci\u00f3n conectado a openid-connect presta servicios a m\u00faltiples emisores. 3. Varios emisores comparten la misma clave privada y dependen \u00fanicamente de que el emisor sea diferente. Si se ve afectado por esta vulnerabilidad, un atacante con una cuenta v\u00e1lida en uno de los emisores podr\u00eda iniciar sesi\u00f3n en el otro. Este problema afecta a Apache APISIX hasta la versi\u00f3n 3.12.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 3.12.0 o superior.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-302\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:apisix:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.12.0\",\"matchCriteriaId\":\"95C48984-B84A-47F5-9D21-9E6D5A8A2BE3\"}]}]}],\"references\":[{\"url\":\"https://lists.apache.org/thread/yrpp2cd3o4qkxlrh421mq8gsrt0k4x0w\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-46647\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-02T20:47:18.458010Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-02T20:46:10.624Z\"}}], \"cna\": {\"title\": \"Apache APISIX: improper validation of issuer from introspection discovery url in plugin openid-connect\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Tiernan Messmer\"}], \"metrics\": [{\"other\": {\"type\": \"Textual description of severity\", \"content\": {\"text\": \"important\"}}}], \"affected\": [{\"vendor\": \"Apache Software Foundation\", \"product\": \"Apache APISIX\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"3.12.0\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://lists.apache.org/thread/yrpp2cd3o4qkxlrh421mq8gsrt0k4x0w\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability of plugin\\u00a0openid-connect in Apache APISIX.\\n\\nThis vulnerability will only have an impact if all of the following conditions are met:\\n1. Use the openid-connect plugin with introspection mode\\n2. The auth service connected to openid-connect provides services to multiple issuers\\n3. Multiple issuers share the same private key and relies only on the issuer being different\\n\\nIf affected by this vulnerability, it would allow an attacker with a valid account on one of the issuers to log into the other issuer.\\n\\n\\n\\n\\nThis issue affects Apache APISIX: until 3.12.0.\\n\\nUsers are recommended to upgrade to version 3.12.0 or higher.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eA vulnerability of plugin\u0026nbsp;openid-connect in Apache APISIX.\u003c/p\u003eThis vulnerability will only have an impact if all of the following conditions are met:\u003cbr\u003e1. Use the openid-connect plugin with introspection mode\u003cbr\u003e2. The auth service connected to openid-connect provides services to multiple issuers\u003cbr\u003e3. Multiple issuers share the same private key and relies only on the issuer being different\u003cbr\u003e\u003cbr\u003e\u003cdiv\u003e\u003cdiv\u003eIf affected by this vulnerability, it would allow an attacker with a valid account on one of the issuers to log into the other issuer.\u003c/div\u003e\u003c/div\u003e\u003cbr\u003e\u003cp\u003eThis issue affects Apache APISIX: until 3.12.0.\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to version 3.12.0 or higher.\u003cbr\u003e\u003cbr\u003e\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-302\", \"description\": \"CWE-302 Authentication Bypass by Assumed-Immutable Data\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2025-07-02T11:08:47.179Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2025-46647\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-02T20:47:21.822Z\", \"dateReserved\": \"2025-04-26T15:02:23.758Z\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2025-07-02T11:08:47.179Z\", \"assignerShortName\": \"apache\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…