Fides is an open-source privacy engineering platform. Prior to version 2.69.1, the Fides Admin UI login endpoint relies on a general IP-based rate limit for all API traffic and lacks specific anti-automation controls designed to protect against brute-force attacks. This could allow attackers to conduct credential testing attacks, such as credential stuffing or password spraying, which poses a risk to accounts with weak or previously compromised passwords. Version 2.69.1 fixes the issue. For organizations with commercial Fides Enterprise licenses, configuring Single Sign-On (SSO) through an OIDC provider (like Azure, Google, or Okta) is an effective workaround. When OIDC SSO is enabled, username/password authentication can be disabled entirely, which eliminates this attack vector. This functionality is not available for Fides Open Source users.
References
Link | Resource |
---|---|
https://github.com/ethyca/fides/commit/59903c195e2f9f8915a1db94950aefd557033a5c | Patch |
https://github.com/ethyca/fides/releases/tag/2.69.1 | Release Notes |
https://github.com/ethyca/fides/security/advisories/GHSA-7q62-r88r-j5gw | Vendor Advisory |
Configurations
History
10 Sep 2025, 18:43
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:ethyca:fides:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | () https://github.com/ethyca/fides/commit/59903c195e2f9f8915a1db94950aefd557033a5c - Patch | |
References | () https://github.com/ethyca/fides/releases/tag/2.69.1 - Release Notes | |
References | () https://github.com/ethyca/fides/security/advisories/GHSA-7q62-r88r-j5gw - Vendor Advisory | |
First Time |
Ethyca fides
Ethyca |
08 Sep 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-08 22:15
Updated : 2025-09-10 18:43
NVD link : CVE-2025-57815
Mitre link : CVE-2025-57815
CVE.ORG link : CVE-2025-57815
JSON object : View
Products Affected
ethyca
- fides
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts