Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/kuadrant/authorino
  4. ›
  5. CVE-2025-25207

CVE-2025-25207: Authorino Uncontrolled Resource Consumption vulnerability

June 9, 2025 (updated June 10, 2025)

The Authorino service in the Red Hat Connectivity Link is the authorization service for zero trust API security. Authorino allows the users with developer persona to add callbacks to be executed to HTTP endpoints once the authorization process is completed. It was found that an attacker with developer persona access can add a large number of those callbacks to be executed by Authorino and as the authentication policy is enforced by a single instance of the service, this leada to a Denial of Service in Authorino while processing the post-authorization callbacks.

References

  • access.redhat.com/security/cve/CVE-2025-25207
  • bugzilla.redhat.com/show_bug.cgi?id=2347421
  • github.com/Kuadrant/authorino
  • github.com/advisories/GHSA-r8xr-pgv5-gxw3
  • nvd.nist.gov/vuln/detail/CVE-2025-25207

Code Behaviors & Features

Detect and mitigate CVE-2025-25207 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 0.20.0

Solution

Unfortunately, there is no solution available yet.

Impact 5.7 MEDIUM

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Learn more about CVSS

Weakness

  • CWE-400: Uncontrolled Resource Consumption

Source file

go/github.com/kuadrant/authorino/CVE-2025-25207.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:18:30 +0000.