CVE-2025-57815

Severity CVSS v4.0:
LOW
Type:
Unavailable / Other
Publication date:
08/09/2025
Last modified:
10/09/2025

Description

Fides is an open-source privacy engineering platform. Prior to version 2.69.1, the Fides Admin UI login endpoint relies on a general IP-based rate limit for all API traffic and lacks specific anti-automation controls designed to protect against brute-force attacks. This could allow attackers to conduct credential testing attacks, such as credential stuffing or password spraying, which poses a risk to accounts with weak or previously compromised passwords. Version 2.69.1 fixes the issue. For organizations with commercial Fides Enterprise licenses, configuring Single Sign-On (SSO) through an OIDC provider (like Azure, Google, or Okta) is an effective workaround. When OIDC SSO is enabled, username/password authentication can be disabled entirely, which eliminates this attack vector. This functionality is not available for Fides Open Source users.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:ethyca:fides:*:*:*:*:*:*:*:* 2.69.1 (excluding)