CVE-2025-57815
Python vulnerability analysis and mitigation

Overview

CVE-2025-57815 affects Fides, an open-source privacy engineering platform, prior to version 2.69.1. The vulnerability was discovered and disclosed on September 8, 2025, and involves insufficient protection against brute-force attacks on the Fides Admin UI login endpoint. The system relied only on a general IP-based rate limit for all API traffic without specific anti-automation controls for authentication attempts (GitHub Advisory).

Technical details

The vulnerability stems from the Fides Admin UI login endpoint's reliance on a single, system-wide rate limit that must be set high enough to accommodate high-volume legitimate traffic, resulting in inadequate protection for authentication attempts. The vulnerability has been assigned a CVSS v4.0 score of 1.7 (LOW) with the vector string CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U. It is classified as CWE-307: Improper Restriction of Excessive Authentication Attempts (NVD).

Impact

While traditional brute-force attacks against single accounts are made difficult by password complexity requirements and global rate limits, the vulnerability exposes the system to more targeted attacks. Attackers could potentially conduct credential testing attacks, such as credential stuffing or password spraying, particularly against accounts with weak or previously compromised passwords. Successful exploitation would grant full access to the compromised user's privileges within the Fides Admin UI (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Fides version 2.69.1. For organizations with commercial Fides Enterprise licenses, a workaround is available through configuring Single Sign-On (SSO) via an OIDC provider (such as Azure, Google, or Okta). When OIDC SSO is enabled, username/password authentication can be disabled entirely, eliminating the attack vector. However, this workaround is not available for Fides Open Source users (GitHub Release, GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-57817HIGH8.6
  • PythonPython
  • ethyca-fides
NoYesSep 08, 2025
CVE-2025-58446MEDIUM6.9
  • PythonPython
  • xgrammar
NoYesSep 06, 2025
CVE-2025-57816MEDIUM6.3
  • PythonPython
  • ethyca-fides
NoYesSep 08, 2025
CVE-2025-57815LOW1.7
  • PythonPython
  • ethyca-fides
NoYesSep 08, 2025
CVE-2025-57766LOW1.7
  • PythonPython
  • ethyca-fides
NoYesSep 08, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management