We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54864

Hydra missing authentication when triggering evaluations through GitHub and Gitea plugins



Description

Hydra is a continuous integration service for Nix based projects. Prior to commit f7bda02, /api/push-github and /api/push-gitea are called by the corresponding forge without HTTP Basic authentication. Both forges do however feature HMAC signing with a secret key. Triggering an evaluation can be very taxing on the infrastructure when large evaluations are done, introducing potential denial of service attacks on the host running the evaluator. This issue has been patched by commit f7bda02. A workaround involves blocking /api/push-github and /api/push-gitea via a reverse proxy.

Reserved 2025-07-31 | Published 2025-08-12 | Updated 2025-08-12 | Assigner GitHub_M


MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-306: Missing Authentication for Critical Function

Product status

< f7bda020c6144913f134ec616783e57817f7686f
affected

References

github.com/.../hydra/security/advisories/GHSA-qpq3-646c-vgx9

github.com/...ommit/f7bda020c6144913f134ec616783e57817f7686f

cve.org (CVE-2025-54864)

nvd.nist.gov (CVE-2025-54864)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54864

Support options

Helpdesk Chat, Email, Knowledgebase