Fides is an open-source privacy engineering platform. Prior to version 2.69.1, the Fides Webserver API's built-in IP-based rate limiting is ineffective in environments with CDNs, proxies or load balancers. The system incorrectly applies rate limits based on directly connected infrastructure IPs rather than client IPs, and stores counters in-memory rather than in a shared store. This allows attackers to bypass intended rate limits and potentially cause denial of service. This vulnerability only affects deployments relying on Fides's built-in rate limiting for protection. Deployments using external rate limiting solutions (WAFs, API gateways, etc.) are not affected. Version 2.69.1 fixes the issue. There are no application-level workarounds. However, rate limiting may instead be implemented externally at the infrastructure level using a WAF, API Gateway, or similar technology.
References
Link | Resource |
---|---|
https://github.com/ethyca/fides/commit/59903c195e2f9f8915a1db94950aefd557033a5c | Patch |
https://github.com/ethyca/fides/releases/tag/2.69.1 | Release Notes |
https://github.com/ethyca/fides/security/advisories/GHSA-fq34-xw6c-fphf | Vendor Advisory |
Configurations
History
10 Sep 2025, 18:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ethyca/fides/commit/59903c195e2f9f8915a1db94950aefd557033a5c - Patch | |
References | () https://github.com/ethyca/fides/releases/tag/2.69.1 - Release Notes | |
References | () https://github.com/ethyca/fides/security/advisories/GHSA-fq34-xw6c-fphf - Vendor Advisory | |
First Time |
Ethyca fides
Ethyca |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:a:ethyca:fides:*:*:*:*:*:*:*:* |
08 Sep 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-08 22:15
Updated : 2025-09-10 18:42
NVD link : CVE-2025-57816
Mitre link : CVE-2025-57816
CVE.ORG link : CVE-2025-57816
JSON object : View
Products Affected
ethyca
- fides
CWE
CWE-799
Improper Control of Interaction Frequency