CVE-2025-46647 (GCVE-0-2025-46647)

Vulnerability from cvelistv5 – Published: 2025-07-02 11:08 – Updated: 2025-11-04 21:10
VLAI?
Summary
A vulnerability of plugin openid-connect in Apache APISIX. This vulnerability will only have an impact if all of the following conditions are met: 1. Use the openid-connect plugin with introspection mode 2. The auth service connected to openid-connect provides services to multiple issuers 3. Multiple issuers share the same private key and relies only on the issuer being different If affected by this vulnerability, it would allow an attacker with a valid account on one of the issuers to log into the other issuer. This issue affects Apache APISIX: until 3.12.0. Users are recommended to upgrade to version 3.12.0 or higher.
Severity ?
No CVSS data available.
CWE
  • CWE-302 - Authentication Bypass by Assumed-Immutable Data
Assigner
References
Impacted products
Vendor Product Version
Apache Software Foundation Apache APISIX Affected: 0 , < 3.12.0 (semver)
Create a notification for this product.
Credits
Tiernan Messmer
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 5.3,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-46647",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-02T20:47:18.458010Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-02T20:47:21.822Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-04T21:10:49.580Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "http://www.openwall.com/lists/oss-security/2025/07/02/1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Apache APISIX",
          "vendor": "Apache Software Foundation",
          "versions": [
            {
              "lessThan": "3.12.0",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Tiernan Messmer"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA vulnerability of plugin\u0026nbsp;openid-connect in Apache APISIX.\u003c/p\u003eThis vulnerability will only have an impact if all of the following conditions are met:\u003cbr\u003e1. Use the openid-connect plugin with introspection mode\u003cbr\u003e2. The auth service connected to openid-connect provides services to multiple issuers\u003cbr\u003e3. Multiple issuers share the same private key and relies only on the issuer being different\u003cbr\u003e\u003cbr\u003e\u003cdiv\u003e\u003cdiv\u003eIf affected by this vulnerability, it would allow an attacker with a valid account on one of the issuers to log into the other issuer.\u003c/div\u003e\u003c/div\u003e\u003cbr\u003e\u003cp\u003eThis issue affects Apache APISIX: until 3.12.0.\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to version 3.12.0 or higher.\u003cbr\u003e\u003cbr\u003e\u003c/p\u003e"
            }
          ],
          "value": "A vulnerability of plugin\u00a0openid-connect in Apache APISIX.\n\nThis vulnerability will only have an impact if all of the following conditions are met:\n1. Use the openid-connect plugin with introspection mode\n2. The auth service connected to openid-connect provides services to multiple issuers\n3. Multiple issuers share the same private key and relies only on the issuer being different\n\nIf affected by this vulnerability, it would allow an attacker with a valid account on one of the issuers to log into the other issuer.\n\n\n\n\nThis issue affects Apache APISIX: until 3.12.0.\n\nUsers are recommended to upgrade to version 3.12.0 or higher."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "text": "important"
            },
            "type": "Textual description of severity"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-302",
              "description": "CWE-302 Authentication Bypass by Assumed-Immutable Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-02T11:08:47.179Z",
        "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
        "shortName": "apache"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.apache.org/thread/yrpp2cd3o4qkxlrh421mq8gsrt0k4x0w"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Apache APISIX: improper validation of issuer from introspection discovery url in plugin openid-connect",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
    "assignerShortName": "apache",
    "cveId": "CVE-2025-46647",
    "datePublished": "2025-07-02T11:08:47.179Z",
    "dateReserved": "2025-04-26T15:02:23.758Z",
    "dateUpdated": "2025-11-04T21:10:49.580Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-46647\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2025-07-02T12:15:28.227\",\"lastModified\":\"2025-11-04T22:16:15.753\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability of plugin\u00a0openid-connect in Apache APISIX.\\n\\nThis vulnerability will only have an impact if all of the following conditions are met:\\n1. Use the openid-connect plugin with introspection mode\\n2. The auth service connected to openid-connect provides services to multiple issuers\\n3. Multiple issuers share the same private key and relies only on the issuer being different\\n\\nIf affected by this vulnerability, it would allow an attacker with a valid account on one of the issuers to log into the other issuer.\\n\\n\\n\\n\\nThis issue affects Apache APISIX: until 3.12.0.\\n\\nUsers are recommended to upgrade to version 3.12.0 or higher.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad del complemento openid-connect en Apache APISIX. Esta vulnerabilidad solo tendr\u00e1 impacto si se cumplen todas las siguientes condiciones: 1. Usar el complemento openid-connect con modo de introspecci\u00f3n. 2. El servicio de autenticaci\u00f3n conectado a openid-connect presta servicios a m\u00faltiples emisores. 3. Varios emisores comparten la misma clave privada y dependen \u00fanicamente de que el emisor sea diferente. Si se ve afectado por esta vulnerabilidad, un atacante con una cuenta v\u00e1lida en uno de los emisores podr\u00eda iniciar sesi\u00f3n en el otro. Este problema afecta a Apache APISIX hasta la versi\u00f3n 3.12.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 3.12.0 o superior.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-302\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:apisix:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.12.0\",\"matchCriteriaId\":\"95C48984-B84A-47F5-9D21-9E6D5A8A2BE3\"}]}]}],\"references\":[{\"url\":\"https://lists.apache.org/thread/yrpp2cd3o4qkxlrh421mq8gsrt0k4x0w\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/07/02/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2025/07/02/1\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-04T21:10:49.580Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-46647\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-02T20:47:18.458010Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-02T20:46:10.624Z\"}}], \"cna\": {\"title\": \"Apache APISIX: improper validation of issuer from introspection discovery url in plugin openid-connect\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Tiernan Messmer\"}], \"metrics\": [{\"other\": {\"type\": \"Textual description of severity\", \"content\": {\"text\": \"important\"}}}], \"affected\": [{\"vendor\": \"Apache Software Foundation\", \"product\": \"Apache APISIX\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"3.12.0\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://lists.apache.org/thread/yrpp2cd3o4qkxlrh421mq8gsrt0k4x0w\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability of plugin\\u00a0openid-connect in Apache APISIX.\\n\\nThis vulnerability will only have an impact if all of the following conditions are met:\\n1. Use the openid-connect plugin with introspection mode\\n2. The auth service connected to openid-connect provides services to multiple issuers\\n3. Multiple issuers share the same private key and relies only on the issuer being different\\n\\nIf affected by this vulnerability, it would allow an attacker with a valid account on one of the issuers to log into the other issuer.\\n\\n\\n\\n\\nThis issue affects Apache APISIX: until 3.12.0.\\n\\nUsers are recommended to upgrade to version 3.12.0 or higher.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eA vulnerability of plugin\u0026nbsp;openid-connect in Apache APISIX.\u003c/p\u003eThis vulnerability will only have an impact if all of the following conditions are met:\u003cbr\u003e1. Use the openid-connect plugin with introspection mode\u003cbr\u003e2. The auth service connected to openid-connect provides services to multiple issuers\u003cbr\u003e3. Multiple issuers share the same private key and relies only on the issuer being different\u003cbr\u003e\u003cbr\u003e\u003cdiv\u003e\u003cdiv\u003eIf affected by this vulnerability, it would allow an attacker with a valid account on one of the issuers to log into the other issuer.\u003c/div\u003e\u003c/div\u003e\u003cbr\u003e\u003cp\u003eThis issue affects Apache APISIX: until 3.12.0.\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to version 3.12.0 or higher.\u003cbr\u003e\u003cbr\u003e\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-302\", \"description\": \"CWE-302 Authentication Bypass by Assumed-Immutable Data\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2025-07-02T11:08:47.179Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-46647\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-04T21:10:49.580Z\", \"dateReserved\": \"2025-04-26T15:02:23.758Z\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2025-07-02T11:08:47.179Z\", \"assignerShortName\": \"apache\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…