Metrics
Affected Vendors & Products
Wed, 10 Sep 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:ethyca:fides:*:*:*:*:*:*:*:* | |
Metrics |
cvssV3_1
|
Tue, 09 Sep 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ethyca
Ethyca fides |
|
Vendors & Products |
Ethyca
Ethyca fides |
Tue, 09 Sep 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 08 Sep 2025 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Fides is an open-source privacy engineering platform. Prior to version 2.69.1, the Fides Webserver API's built-in IP-based rate limiting is ineffective in environments with CDNs, proxies or load balancers. The system incorrectly applies rate limits based on directly connected infrastructure IPs rather than client IPs, and stores counters in-memory rather than in a shared store. This allows attackers to bypass intended rate limits and potentially cause denial of service. This vulnerability only affects deployments relying on Fides's built-in rate limiting for protection. Deployments using external rate limiting solutions (WAFs, API gateways, etc.) are not affected. Version 2.69.1 fixes the issue. There are no application-level workarounds. However, rate limiting may instead be implemented externally at the infrastructure level using a WAF, API Gateway, or similar technology. | |
Title | Fides Webserver API Rate Limiting Vulnerability in Proxied Environments | |
Weaknesses | CWE-799 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-09T14:19:27.430Z
Reserved: 2025-08-20T14:30:35.011Z
Link: CVE-2025-57816

Updated: 2025-09-09T14:19:13.181Z

Status : Analyzed
Published: 2025-09-08T22:15:33.703
Modified: 2025-09-10T18:42:17.857
Link: CVE-2025-57816

No data.