CVE-2025-64513

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-64513
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-64513.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-64513
Aliases
Published
2025-11-10T22:05:14.744Z
Modified
2025-11-20T10:09:57.108395Z
Severity
  • 9.3 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
Milvus Proxy has Critical Authentication Bypass Vulnerability
Details

Milvus is an open-source vector database built for generative AI applications. An unauthenticated attacker can exploit a vulnerability in versions prior to 2.4.24, 2.5.21, and 2.6.5 to bypass all authentication mechanisms in the Milvus Proxy component, gaining full administrative access to the Milvus cluster. This grants the attacker the ability to read, modify, or delete data, and to perform privileged administrative operations such as database or collection management. This issue has been fixed in Milvus 2.4.24, 2.5.21, and 2.6.5. If immediate upgrade is not possible, a temporary mitigation can be applied by removing the sourceID header from all incoming requests at the gateway, API gateway, or load balancer level before they reach the Milvus Proxy. This prevents attackers from exploiting the authentication bypass behavior.

Database specific
{
    "cwe_ids": [
        "CWE-287"
    ]
}
References

Affected packages

Git / github.com/milvus-io/milvus

Affected ranges

Type
GIT
Repo
https://github.com/milvus-io/milvus
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "2.4.24"
        }
    ]
}
Type
GIT
Repo
https://github.com/milvus-io/milvus
Events
Database specific
{
    "versions": [
        {
            "introduced": "2.5.0"
        },
        {
            "fixed": "2.5.21"
        }
    ]
}
Type
GIT
Repo
https://github.com/milvus-io/milvus
Events
Database specific
{
    "versions": [
        {
            "introduced": "2.6.0"
        },
        {
            "fixed": "2.6.5"
        }
    ]
}

Affected versions

client/v2.*

client/v2.5.0
client/v2.5.1
client/v2.5.2
client/v2.5.3
client/v2.5.4
client/v2.5.5
client/v2.5.6
client/v2.6.0
client/v2.6.1

pkg/v0.*

pkg/v0.0.1

pkg/v2.*

pkg/v2.5.10
pkg/v2.5.11
pkg/v2.5.12
pkg/v2.5.13
pkg/v2.5.14
pkg/v2.5.15
pkg/v2.5.16
pkg/v2.5.17
pkg/v2.5.18
pkg/v2.5.19
pkg/v2.5.20
pkg/v2.5.21
pkg/v2.5.4
pkg/v2.5.5
pkg/v2.5.6
pkg/v2.5.7
pkg/v2.5.8
pkg/v2.5.9
pkg/v2.6.0
pkg/v2.6.1
pkg/v2.6.2
pkg/v2.6.3
pkg/v2.6.4

v0.*

v0.10.0
v0.10.1
v0.10.2
v0.5.2
v0.5.3
v0.6.0
v0.7.0
v0.9.0

v2.*

v2.0.0
v2.0.0-pre-ga
v2.0.0-rc1
v2.0.0-rc2
v2.0.0-rc4
v2.0.0-rc5
v2.0.0-rc6
v2.0.0-rc7
v2.0.1
v2.3.0
v2.3.0-beta
v2.4.10
v2.4.11
v2.4.12
v2.4.13
v2.4.14
v2.4.15
v2.4.16
v2.4.17
v2.4.18
v2.4.19
v2.4.2
v2.4.20
v2.4.21
v2.4.22
v2.4.23
v2.4.3
v2.4.4
v2.4.5
v2.4.7
v2.4.8
v2.4.9
v2.5.0
v2.5.1
v2.5.10
v2.5.11
v2.5.12
v2.5.13
v2.5.14
v2.5.15
v2.5.16
v2.5.17
v2.5.18
v2.5.19
v2.5.2
v2.5.20
v2.5.3
v2.5.4
v2.5.5
v2.5.6
v2.5.7
v2.5.8
v2.5.9
v2.6.0
v2.6.1
v2.6.2
v2.6.3
v2.6.4