ID

VAR-202507-0652


CVE

CVE-2025-46647


TITLE

Apache Software Foundation  of  APISIX  Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2025-008452

DESCRIPTION

A vulnerability of plugin openid-connect in Apache APISIX. This vulnerability will only have an impact if all of the following conditions are met: 1. Use the openid-connect plugin with introspection mode 2. The auth service connected to openid-connect provides services to multiple issuers 3. Multiple issuers share the same private key and relies only on the issuer being different If affected by this vulnerability, it would allow an attacker with a valid account on one of the issuers to log into the other issuer. This issue affects Apache APISIX: until 3.12.0. Users are recommended to upgrade to version 3.12.0 or higher. Apache Software Foundation of APISIX Exists in unspecified vulnerabilities.Information may be obtained

Trust: 1.62

sources: NVD: CVE-2025-46647 // JVNDB: JVNDB-2025-008452

AFFECTED PRODUCTS

vendor:apachemodel:apisixscope:ltversion:3.12.0

Trust: 1.0

vendor:apachemodel:apisixscope: - version: -

Trust: 0.8

vendor:apachemodel:apisixscope:eqversion:3.12.0

Trust: 0.8

vendor:apachemodel:apisixscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2025-008452 // NVD: CVE-2025-46647

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-46647
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2025-008452
value: MEDIUM

Trust: 0.8

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2025-46647
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.6
impactScore: 3.6
version: 3.1

Trust: 1.0

OTHER: JVNDB-2025-008452
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2025-008452 // NVD: CVE-2025-46647

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-302

Trust: 1.0

problemtype:Authentication Bypass Vulnerability (CWE-302) [ others ]

Trust: 0.8

problemtype: Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-008452 // NVD: CVE-2025-46647

EXTERNAL IDS

db:NVDid:CVE-2025-46647

Trust: 2.6

db:JVNDBid:JVNDB-2025-008452

Trust: 0.8

sources: JVNDB: JVNDB-2025-008452 // NVD: CVE-2025-46647

REFERENCES

url:https://lists.apache.org/thread/yrpp2cd3o4qkxlrh421mq8gsrt0k4x0w

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2025-46647

Trust: 0.8

sources: JVNDB: JVNDB-2025-008452 // NVD: CVE-2025-46647

SOURCES

db:JVNDBid:JVNDB-2025-008452
db:NVDid:CVE-2025-46647

LAST UPDATE DATE

2025-07-16T23:30:27.603000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2025-008452date:2025-07-11T00:55:00
db:NVDid:CVE-2025-46647date:2025-07-09T15:25:56.260

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2025-008452date:2025-07-11T00:00:00
db:NVDid:CVE-2025-46647date:2025-07-02T12:15:28.227