![]() |
|
Message-ID: <7ef4653a-54ba-50e3-7c07-f823a7caa679@apache.org> Date: Wed, 02 Jul 2025 01:08:55 +0000 From: Junxu Chen <chenjunxu@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2025-46647: Apache APISIX: improper validation of issuer from introspection discovery url in plugin openid-connect Severity: important Affected versions: - Apache APISIX before 3.12.0 Description: A vulnerability of plugin openid-connect in Apache APISIX. This vulnerability will only have an impact if all of the following conditions are met: 1. Use the openid-connect plugin with introspection mode 2. The auth service connected to openid-connect provides services to multiple issuers 3. Multiple issuers share the same private key and relies only on the issuer being different If affected by this vulnerability, it would allow an attacker with a valid account on one of the issuers to log into the other issuer. This issue affects Apache APISIX: until 3.12.0. Users are recommended to upgrade to version 3.12.0 or higher. Credit: Tiernan Messmer (finder) References: https://lists.apache.org/thread/yrpp2cd3o4qkxlrh421mq8gsrt0k4x0w https://apisix.apache.org https://www.cve.org/CVERecord?id=CVE-2025-46647
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.