Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. Flask-AppBuilder
  4. ›
  5. CVE-2025-58065

CVE-2025-58065: Flask App Builder has an Authentication Bypass vulnerability when using non AUTH_DB methods

September 11, 2025 (updated September 13, 2025)

When Flask-AppBuilder is configured to use OAuth, LDAP, or other non-database authentication methods, the password reset endpoint remains registered and accessible, despite not being displayed in the user interface. This allows an enabled user to reset their password and be able to create JWT tokens even after the user is disabled on the authentication provider.

References

  • github.com/advisories/GHSA-765j-9r45-w2q2
  • github.com/dpgaspar/Flask-AppBuilder
  • github.com/dpgaspar/Flask-AppBuilder/commit/a942a9cc5775752f9a02f97fd8198dd288fa93ee
  • github.com/dpgaspar/Flask-AppBuilder/pull/2384
  • github.com/dpgaspar/Flask-AppBuilder/releases/tag/v4.8.1
  • github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-765j-9r45-w2q2
  • nvd.nist.gov/vuln/detail/CVE-2025-58065

Code Behaviors & Features

Detect and mitigate CVE-2025-58065 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 4.8.1

Fixed versions

  • 4.8.1

Solution

Upgrade to version 4.8.1 or above.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-287: Improper Authentication

Source file

pypi/Flask-AppBuilder/CVE-2025-58065.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Fri, 26 Sep 2025 00:20:37 +0000.