CVE-2025-57766

Fides is an open-source privacy engineering platform. Prior to version 2.69.1, admin UI user password changes in Fides do not invalidate active user sessions, creating a vulnerability chaining opportunity where attackers who have obtained session tokens through other attack vectors (such as XSS) can maintain access even after password reset. This issue is not directly exploitable on its own and requires a prerequisite vulnerability to obtain valid session tokens in the first place. Version 2.69.1 fixes the issue. No known workarounds are available.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ethyca:fides:*:*:*:*:*:*:*:*

History

10 Sep 2025, 18:44

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.8
References () https://github.com/ethyca/fides/commit/8daec4f5ad3daf0f0bdab4814f6757eb0965104b - () https://github.com/ethyca/fides/commit/8daec4f5ad3daf0f0bdab4814f6757eb0965104b - Patch
References () https://github.com/ethyca/fides/releases/tag/2.69.1 - () https://github.com/ethyca/fides/releases/tag/2.69.1 - Release Notes
References () https://github.com/ethyca/fides/security/advisories/GHSA-rpw8-82v9-3q87 - () https://github.com/ethyca/fides/security/advisories/GHSA-rpw8-82v9-3q87 - Exploit, Vendor Advisory
CPE cpe:2.3:a:ethyca:fides:*:*:*:*:*:*:*:*
First Time Ethyca fides
Ethyca

08 Sep 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-08 22:15

Updated : 2025-09-10 18:44


NVD link : CVE-2025-57766

Mitre link : CVE-2025-57766

CVE.ORG link : CVE-2025-57766


JSON object : View

Products Affected

ethyca

  • fides
CWE
CWE-613

Insufficient Session Expiration