Home

Description

Fides is an open-source privacy engineering platform. Prior to version 2.69.1, admin UI user password changes in Fides do not invalidate active user sessions, creating a vulnerability chaining opportunity where attackers who have obtained session tokens through other attack vectors (such as XSS) can maintain access even after password reset. This issue is not directly exploitable on its own and requires a prerequisite vulnerability to obtain valid session tokens in the first place. Version 2.69.1 fixes the issue. No known workarounds are available.

PUBLISHED Reserved 2025-08-19 | Published 2025-09-08 | Updated 2025-09-09 | Assigner GitHub_M




LOW: 1.7CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U

Problem types

CWE-613: Insufficient Session Expiration

Product status

< 2.69.1
affected

References

github.com/.../fides/security/advisories/GHSA-rpw8-82v9-3q87

github.com/...ommit/8daec4f5ad3daf0f0bdab4814f6757eb0965104b

github.com/ethyca/fides/releases/tag/2.69.1

cve.org (CVE-2025-57766)

nvd.nist.gov (CVE-2025-57766)

Download JSON