{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-46647","assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","state":"PUBLISHED","assignerShortName":"apache","dateReserved":"2025-04-26T15:02:23.758Z","datePublished":"2025-07-02T11:08:47.179Z","dateUpdated":"2025-11-04T21:10:49.580Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Apache APISIX","vendor":"Apache Software Foundation","versions":[{"lessThan":"3.12.0","status":"affected","version":"0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Tiernan Messmer"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>A vulnerability of plugin&nbsp;openid-connect in Apache APISIX.</p>This vulnerability will only have an impact if all of the following conditions are met:<br>1. Use the openid-connect plugin with introspection mode<br>2. The auth service connected to openid-connect provides services to multiple issuers<br>3. Multiple issuers share the same private key and relies only on the issuer being different<br><br><div><div>If affected by this vulnerability, it would allow an attacker with a valid account on one of the issuers to log into the other issuer.</div></div><br><p>This issue affects Apache APISIX: until 3.12.0.</p><p>Users are recommended to upgrade to version 3.12.0 or higher.<br><br></p>"}],"value":"A vulnerability of plugin openid-connect in Apache APISIX.\n\nThis vulnerability will only have an impact if all of the following conditions are met:\n1. Use the openid-connect plugin with introspection mode\n2. The auth service connected to openid-connect provides services to multiple issuers\n3. Multiple issuers share the same private key and relies only on the issuer being different\n\nIf affected by this vulnerability, it would allow an attacker with a valid account on one of the issuers to log into the other issuer.\n\n\n\n\nThis issue affects Apache APISIX: until 3.12.0.\n\nUsers are recommended to upgrade to version 3.12.0 or higher."}],"metrics":[{"other":{"content":{"text":"important"},"type":"Textual description of severity"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-302","description":"CWE-302 Authentication Bypass by Assumed-Immutable Data","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache","dateUpdated":"2025-07-02T11:08:47.179Z"},"references":[{"tags":["vendor-advisory"],"url":"https://lists.apache.org/thread/yrpp2cd3o4qkxlrh421mq8gsrt0k4x0w"}],"source":{"discovery":"UNKNOWN"},"title":"Apache APISIX: improper validation of issuer from introspection discovery url in plugin openid-connect","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.3,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"HIGH","availabilityImpact":"NONE","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-07-02T20:47:18.458010Z","id":"CVE-2025-46647","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-02T20:47:21.822Z"}},{"title":"CVE Program Container","references":[{"url":"http://www.openwall.com/lists/oss-security/2025/07/02/1"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-04T21:10:49.580Z"}}]}}