CVE-2023-51982
Java vulnerability analysis and mitigation

Overview

CrateDB 5.5.1 contains an authentication bypass vulnerability in the Admin UI component. The vulnerability was discovered on December 21, 2023, and allows attackers to bypass password authentication when accessing the Admin UI directly using the default user identity. This is achieved by setting the X-Real-IP request header to a specific value when local address authentication is configured (GitHub Issue).

Technical details

The vulnerability exists in the authentication mechanism of CrateDB's Admin UI component. When host-based authentication is enabled with local address configuration, the system checks if the IP address matches '127.0.0.1' or '::1'. The vulnerability can be exploited by manipulating the X-Real-IP request header to these values, allowing unauthorized access. The issue has been assigned a CVSS v3.1 base score of 9.8 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) (NVD).

Impact

A successful exploitation of this vulnerability allows attackers to bypass authentication and gain unauthorized access to the Admin UI with default user privileges. This could potentially lead to complete system compromise as the attacker would have administrative access to the database management interface (GitHub Issue).

Mitigation and workarounds

The vulnerability affects CrateDB version 5.5.1. Users should monitor for updates from CrateDB for a patched version. In the meantime, organizations should carefully review their authentication configurations and consider implementing additional security controls such as network-level access restrictions (NVD).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68931HIGH8.7
  • JavaJava
  • net.gleske:jervis
NoYesJan 13, 2026
CVE-2025-68703HIGH8.7
  • JavaJava
  • net.gleske:jervis
NoYesJan 13, 2026
CVE-2025-68704HIGH8.2
  • JavaJava
  • net.gleske:jervis
NoYesJan 13, 2026
CVE-2025-66169MEDIUM6.9
  • JavaJava
  • org.apache.camel:camel-neo4j
NoYesJan 14, 2026
CVE-2025-68925MEDIUM6.9
  • JavaJava
  • net.gleske:jervis
NoYesJan 13, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management