CVE-2025-46647
Apache APISIX vulnerability analysis and mitigation

Overview

A vulnerability (CVE-2025-46647) has been identified in the openid-connect plugin of Apache APISIX, discovered and reported by JunXu Chen and credited to security researcher Tiernan Messmer on July 2, 2025. The vulnerability affects Apache APISIX versions prior to 3.12.0 and has been rated as 'Important' with a CVSS v3.1 base score of 5.3 (Medium) (NVD, Security Online).

Technical details

The vulnerability stems from improper validation of the token issuer in the OpenID Connect plugin when used in introspection mode. The flaw manifests when three specific conditions are met: 1) The openid-connect plugin is used in introspection mode, 2) The authentication service connected to the plugin supports multiple issuers, and 3) Multiple issuers share the same private key and rely solely on the issuer value for differentiation. The vulnerability is classified as CWE-302 (Authentication Bypass by Assumed-Immutable Data) (NVD, GBHackers).

Impact

If successfully exploited, this vulnerability would allow an attacker with valid credentials on one issuer to gain unauthorized access to resources protected by another issuer, effectively bypassing cross-issuer boundaries. This is particularly concerning in multi-tenant enterprise environments or federated cloud architectures where a single identity provider is used across multiple logical domains (Security Online).

Mitigation and workarounds

Users are strongly advised to upgrade to Apache APISIX version 3.12.0 or higher, which contains the fix for this vulnerability. The Apache APISIX team has addressed the issue by implementing proper validation of the issuer in the openid-connect plugin (NVD).

Additional resources


SourceThis report was generated using AI

Related Apache APISIX vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-27446HIGH7.8
  • Apache APISIXApache APISIX
  • cpe:2.3:a:apache:apisix
NoYesJul 06, 2025
CVE-2025-62232HIGH7.5
  • Apache APISIXApache APISIX
  • cpe:2.3:a:apache:apisix
NoYesOct 31, 2025
CVE-2022-29266HIGH7.5
  • Apache APISIXApache APISIX
  • cpe:2.3:a:apache:apisix
NoYesApr 20, 2022
CVE-2024-32638MEDIUM6.3
  • Apache APISIXApache APISIX
  • cpe:2.3:a:apache:apisix
NoYesMay 02, 2024
CVE-2025-46647MEDIUM5.3
  • Apache APISIXApache APISIX
  • cpe:2.3:a:apache:apisix
NoYesJul 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management