Unrated severityNVD Advisory· Published Sep 7, 2022· Updated Apr 23, 2025
VelaUX APIServer vulnerable to Authentication Bypass by Capture-replay
CVE-2022-36089
Description
KubeVela is an application delivery platform Users using KubeVela's VelaUX APIServer could be affected by an authentication bypass vulnerability. In KubeVela prior to versions 1.4.11 and 1.5.4, VelaUX APIServer uses the PlatformID as the signed key to generate the JWT tokens for users. Another API called getSystemInfo exposes the platformID. This vulnerability allows users to use the platformID to re-generate the JWT tokens to bypass the authentication. Versions 1.4.11 and 1.5.4 contain a patch for this issue.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/kubevela/kubevela/pull/4634mitrex_refsource_MISC
- github.com/kubevela/kubevela/security/advisories/GHSA-cq42-w295-r29qmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.