GHSA-r8xr-pgv5-gxw3

Suggest an improvement
Source
https://github.com/advisories/GHSA-r8xr-pgv5-gxw3
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-r8xr-pgv5-gxw3/GHSA-r8xr-pgv5-gxw3.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-r8xr-pgv5-gxw3
Aliases
Published
2025-06-09T06:30:21Z
Modified
2025-06-10T19:59:36Z
Severity
  • 5.7 (Medium) CVSS_V3 - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Authorino Uncontrolled Resource Consumption vulnerability
Details

The Authorino service in the Red Hat Connectivity Link is the authorization service for zero trust API security. Authorino allows the users with developer persona to add callbacks to be executed to HTTP endpoints once the authorization process is completed. It was found that an attacker with developer persona access can add a large number of those callbacks to be executed by Authorino and as the authentication policy is enforced by a single instance of the service, this leada to a Denial of Service in Authorino while processing the post-authorization callbacks.

Database specific
{
    "nvd_published_at": "2025-06-09T06:15:24Z",
    "cwe_ids": [
        "CWE-400"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2025-06-09T13:10:32Z"
}
References

Affected packages

Go / github.com/kuadrant/authorino

Package

Name
github.com/kuadrant/authorino
View open source insights on deps.dev
Purl
pkg:golang/github.com/kuadrant/authorino

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
0.20.0