Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <7ef4653a-54ba-50e3-7c07-f823a7caa679@apache.org>
Date: Wed, 02 Jul 2025 01:08:55 +0000
From: Junxu Chen <chenjunxu@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2025-46647: Apache APISIX: improper validation of issuer from
 introspection discovery url in plugin openid-connect 

Severity: important 

Affected versions:

- Apache APISIX before 3.12.0

Description:

A vulnerability of plugin openid-connect in Apache APISIX.

This vulnerability will only have an impact if all of the following conditions are met:
1. Use the openid-connect plugin with introspection mode
2. The auth service connected to openid-connect provides services to multiple issuers
3. Multiple issuers share the same private key and relies only on the issuer being different

If affected by this vulnerability, it would allow an attacker with a valid account on one of the issuers to log into the other issuer.




This issue affects Apache APISIX: until 3.12.0.

Users are recommended to upgrade to version 3.12.0 or higher.

Credit:

Tiernan Messmer (finder)

References:

https://lists.apache.org/thread/yrpp2cd3o4qkxlrh421mq8gsrt0k4x0w
https://apisix.apache.org
https://www.cve.org/CVERecord?id=CVE-2025-46647

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.