CVE-2025-64323
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-07

Last updated on: 2025-11-12

Assigner: GitHub, Inc.

Description
kgateway is a Cloud-Native API and AI Gateway. Versions 2.0.4 and below and 2.1.0-agw-cel-rbac through 2.1.0-rc.2 lack authentication, allowing any client with unrestricted network access to the xDS port to retrieve potentially sensitive configuration data including certificate data, backend service information, routing rules, and cluster metadata. This issue is solved in versions 2.0.5 and 2.1.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-07
Last Modified
2025-11-12
Generated
2026-05-07
AI Q&A
2025-11-07
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 7 associated CPEs
Vendor Product Version / Range
kgateway kgateway 2.1.0
kgateway kgateway 2.0.4
kgateway kgateway 2.0.1
kgateway kgateway 2.0.5
kgateway kgateway 2.0.0
kgateway kgateway 2.0.3
kgateway kgateway 2.0.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in kgateway versions 2.0.4 and below and 2.1.0-agw-cel-rbac through 2.1.0-rc.2, where there is a lack of authentication on the xDS port. This allows any client with unrestricted network access to that port to retrieve potentially sensitive configuration data such as certificate data, backend service information, routing rules, and cluster metadata. The issue is fixed in versions 2.0.5 and 2.1.0.


How can this vulnerability impact me? :

The vulnerability can impact you by exposing sensitive configuration data to unauthorized clients. This includes certificate data, backend service information, routing rules, and cluster metadata, which could be used to compromise the security or operation of your systems.


What immediate steps should I take to mitigate this vulnerability?

Upgrade kgateway to version 2.0.5 or 2.1.0 or later, as these versions have fixed the authentication issue allowing unrestricted access to sensitive configuration data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart