CVE-2025-64513
vulnerability analysis and mitigation

Overview

A critical authentication bypass vulnerability (CVE-2025-64513) was discovered in Milvus, an open-source vector database built for generative AI applications. The vulnerability, disclosed on November 10, 2025, affects the Milvus Proxy component across multiple versions including versions prior to 2.4.24, 2.5.21, and 2.6.5. The flaw has received a CVSS score of 9.3, indicating its critical severity (Security Online, GitHub Advisory).

Technical details

The vulnerability exists in the AuthenticationInterceptor function within internal/proxy/authentication_interceptor.go. The root cause was identified as incorrect trust placed in the sourceID header, where the validSourceID function would improperly validate and trust this header value. This implementation flaw allowed the authentication check to be bypassed entirely (Miggo).

Impact

The vulnerability allows an unauthenticated attacker to bypass all authentication mechanisms in the Milvus Proxy component, gaining full administrative access to the Milvus cluster. This access enables attackers to read, modify, or delete data, and perform privileged administrative operations such as database or collection management. The impact is particularly significant for organizations using Milvus to manage and query high-dimensional vector data in AI model retrieval, recommendation systems, and semantic search applications (GitHub Advisory, Security Online).

Mitigation and workarounds

The vulnerability has been patched in Milvus versions 2.4.24, 2.5.21, and 2.6.5. Users are strongly advised to upgrade to these patched versions immediately. For organizations unable to upgrade immediately, a temporary mitigation is available by removing the sourceID header from all incoming requests at the gateway, API gateway, or load balancer level before they reach the Milvus Proxy (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management