Conjur provides secrets management and application identity for infrastructure. Conjur OSS versions 1.19.5 through 1.22.0 and Secrets Manager, Self-Hosted (formerly known as Conjur Enterprise) 13.1 through 13.5 and 13.6 are vulnerable to bypass of the IAM authenticator. An attacker who can manipulate the headers signed by AWS can take advantage of a malformed regular expression to redirect the authentication validation request that Secrets Manager, Self-Hosted sends to AWS to a malicious server controlled by the attacker. This redirection could result in a bypass of the Secrets Manager, Self-Hosted IAM Authenticator, granting the attacker the permissions granted to the client whose request was manipulated. This issue affects both Secrets Manager, Self-Hosted (formerly Conjur Enterprise) and Conjur OSS. Conjur OSS version 1.22.1 and Secrets Manager, Self-Hosted versions 13.5.1 and 13.6.1 fix the issue.
References
Link | Resource |
---|---|
https://github.com/cyberark/conjur/releases/tag/v1.22.1 | Release Notes |
https://github.com/cyberark/conjur/security/advisories/GHSA-gmc5-9mpc-xg75 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
12 Sep 2025, 18:11
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cyberark:conjur:*:*:*:*:open_source:*:*:* cpe:2.3:a:cyberark:conjur:*:*:*:*:enterprise:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | () https://github.com/cyberark/conjur/releases/tag/v1.22.1 - Release Notes | |
References | () https://github.com/cyberark/conjur/security/advisories/GHSA-gmc5-9mpc-xg75 - Vendor Advisory | |
First Time |
Cyberark
Cyberark conjur |
16 Jul 2025, 14:59
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
15 Jul 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-15 20:15
Updated : 2025-09-12 18:11
NVD link : CVE-2025-49827
Mitre link : CVE-2025-49827
CVE.ORG link : CVE-2025-49827
JSON object : View
Products Affected
cyberark
- conjur
CWE
CWE-807
Reliance on Untrusted Inputs in a Security Decision