Loading HuntDB...

CVE-2025-57766

Published Unknown
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-57766. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
0.0
/10
Not Available
Base Score Metrics
Exploitability: N/A Impact: N/A

Attack Vector Metrics

Attack Vector
Not Available
Attack Complexity
Not Available
Privileges Required
Not Available
User Interaction
Not Available
Scope
Not Available

Impact Metrics

Confidentiality
Not Available
Integrity
Not Available
Availability
Not Available

Description

Fides is an open-source privacy engineering platform. Prior to version 2.69.1, admin UI user password changes in Fides do not invalidate active user sessions, creating a vulnerability chaining opportunity where attackers who have obtained session tokens through other attack vectors (such as XSS) can maintain access even after password reset. This issue is not directly exploitable on its own and requires a prerequisite vulnerability to obtain valid session tokens in the first place. Version 2.69.1 fixes the issue. No known workarounds are available.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

Unknown Vendor

Unknown Product

EU Vulnerability Database

Monitored by ENISA for EU cybersecurity

EU Coordination

Not EU Coordinated

Exploitation Status

No Known Exploitation

ENISA Analysis

Malicious code in bioql (PyPI)

Affected Products (ENISA)

ethyca
fides

ENISA Scoring

CVSS Score (4.0)

1.7
/10
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U

EPSS Score

0.040
probability

Data provided by ENISA EU Vulnerability Database. Last updated: October 3, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed LOW

Fides' Admin UI User Password Change Does Not Invalidate Current Session

GHSA-rpw8-82v9-3q87

Advisory Details

### Summary Admin UI user password changes in Fides do not invalidate active user sessions, creating a vulnerability chaining opportunity where attackers who have obtained session tokens through other attack vectors (such as XSS) can maintain access even after password reset. This issue is not directly exploitable on its own and requires a prerequisite vulnerability to obtain valid session tokens in the first place. ### Details Fides uses encrypted authentication tokens with extended expiration periods. When a password is changed via password reset endpoints, the system updates the password hash in the database but does not invalidate existing client sessions or tokens. The authentication system validates tokens based on their cryptographic integrity and expiration time, not against the current password state. The frontend application stores authentication state in browser local storage, which persists across browser sessions until explicit logout or natural token expiration. This behavior alone does not constitute a directly exploitable vulnerability. The security issue only becomes exploitable when chained with other vulnerabilities or conditions that allow attackers to obtain valid session tokens, such as: - Cross-Site Scripting (XSS) attacks that can access browser storage where tokens are stored - Session hijacking through network interception - Malware on the user's device that can read browser storage - Physical device access where attackers can access browser storage directly ### Impact This vulnerability serves as a persistence mechanism in attack chains rather than a primary attack vector. When chained with token theft vulnerabilities, it allows attackers to: - Maintain access beyond the remediation window when users change passwords in response to suspected compromise - Extend the impact timeframe of client-side attacks from minutes/hours to potentially an extended period - Defeat common incident response procedures that rely on password changes to secure compromised accounts Stored tokens persist across browser sessions until explicit logout or natural expiration. ### Patches The vulnerability has been patched in Fides version `2.69.1`. Users are advised to upgrade to this version or later to secure their systems against this threat. ### Workarounds There are no workarounds. ### Severity This vulnerability has been assigned a severity of **LOW** because: - No direct exploitability - requires chaining with other vulnerabilities - High attack complexity - multiple successful exploits needed - Limited standalone impact - only extends existing compromises - Aligns with industry standard classifications of LOW severity for session invalidation failures This is fundamentally a defense-in-depth issue rather than a primary security vulnerability.

Affected Packages

PyPI ethyca-fides
ECOSYSTEM: ≥0 <2.69.1

CVSS Scoring

CVSS Score

2.5

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

Advisory provided by GitHub Security Advisory Database. Published: September 8, 2025, Modified: September 13, 2025

Published: Unknown
Last Modified: Unknown
Copied to clipboard!