Fides is an open-source privacy engineering platform. Prior to version 2.69.1, admin UI user password changes in Fides do not invalidate active user sessions, creating a vulnerability chaining opportunity where attackers who have obtained session tokens through other attack vectors (such as XSS) can maintain access even after password reset. This issue is not directly exploitable on its own and requires a prerequisite vulnerability to obtain valid session tokens in the first place. Version 2.69.1 fixes the issue. No known workarounds are available.
References
Link | Resource |
---|---|
https://github.com/ethyca/fides/commit/8daec4f5ad3daf0f0bdab4814f6757eb0965104b | Patch |
https://github.com/ethyca/fides/releases/tag/2.69.1 | Release Notes |
https://github.com/ethyca/fides/security/advisories/GHSA-rpw8-82v9-3q87 | Exploit Vendor Advisory |
Configurations
History
10 Sep 2025, 18:44
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.8 |
References | () https://github.com/ethyca/fides/commit/8daec4f5ad3daf0f0bdab4814f6757eb0965104b - Patch | |
References | () https://github.com/ethyca/fides/releases/tag/2.69.1 - Release Notes | |
References | () https://github.com/ethyca/fides/security/advisories/GHSA-rpw8-82v9-3q87 - Exploit, Vendor Advisory | |
CPE | cpe:2.3:a:ethyca:fides:*:*:*:*:*:*:*:* | |
First Time |
Ethyca fides
Ethyca |
08 Sep 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-08 22:15
Updated : 2025-09-10 18:44
NVD link : CVE-2025-57766
Mitre link : CVE-2025-57766
CVE.ORG link : CVE-2025-57766
JSON object : View
Products Affected
ethyca
- fides
CWE
CWE-613
Insufficient Session Expiration