{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-57817","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-08-20T14:30:35.011Z","datePublished":"2025-09-08T21:17:09.105Z","dateUpdated":"2025-09-09T13:39:00.895Z"},"containers":{"cna":{"title":"Fides Webserver API is Vulnerable to OAuth Client Privilege Escalation","problemTypes":[{"descriptions":[{"cweId":"CWE-862","lang":"en","description":"CWE-862: Missing Authorization","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":8.6,"baseSeverity":"HIGH","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N","version":"4.0"}}],"references":[{"name":"https://github.com/ethyca/fides/security/advisories/GHSA-hjfh-p8f5-24wr","tags":["x_refsource_CONFIRM"],"url":"https://github.com/ethyca/fides/security/advisories/GHSA-hjfh-p8f5-24wr"},{"name":"https://github.com/ethyca/fides/commit/2ffd125e1089a09b84c27fb5279a05960cbf2452","tags":["x_refsource_MISC"],"url":"https://github.com/ethyca/fides/commit/2ffd125e1089a09b84c27fb5279a05960cbf2452"},{"name":"https://github.com/ethyca/fides/releases/tag/2.69.1","tags":["x_refsource_MISC"],"url":"https://github.com/ethyca/fides/releases/tag/2.69.1"}],"affected":[{"vendor":"ethyca","product":"fides","versions":[{"version":"< 2.69.1","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-09-08T21:19:39.349Z"},"descriptions":[{"lang":"en","value":"Fides is an open-source privacy engineering platform. Prior to version 2.69.1, the OAuth client creation and update endpoints of the Fides Webserver API do not properly authorize scope assignment. This allows highly privileged users with `client:create` or `client:update` permissions to escalate their privileges to owner-level. Version 2.69.1 fixes the issue. No known workarounds are available."}],"source":{"advisory":"GHSA-hjfh-p8f5-24wr","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-09T13:38:53.295848Z","id":"CVE-2025-57817","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-09T13:39:00.895Z"}}]}}