CVE-2025-59036

5.5 MEDIUM

📋 TL;DR

This vulnerability allows deleted or expired API tokens to remain valid for authentication in Infrahub, enabling unauthorized access to the system. Any Infrahub instance running affected versions is vulnerable. Attackers could use previously revoked tokens to access user accounts and perform actions within the system.

💻 Affected Systems

Products:
  • Infrahub
Versions: All versions prior to 1.3.9 and 1.4.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with API token authentication enabled are affected. The vulnerability exists in the core authentication logic.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain persistent unauthorized access using previously revoked tokens, potentially compromising all user accounts and sensitive data managed through Infrahub.

🟠

Likely Case

Former employees or users with revoked tokens maintain unauthorized access to the system, potentially accessing or modifying data they should no longer have access to.

🟢

If Mitigated

With proper monitoring and access controls, unauthorized access attempts can be detected and contained before significant damage occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires possession of a previously valid API token. No special tools or techniques needed beyond using the token for authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.9 or 1.4.5

Vendor Advisory: https://github.com/opsmill/infrahub/security/advisories/GHSA-v2p7-4pv4-3wwh

Restart Required: No

Instructions:

1. Backup your Infrahub configuration and data. 2. Update Infrahub to version 1.3.9 or 1.4.5 using your deployment method (Docker, Kubernetes, etc.). 3. Verify the update completed successfully. 4. Consider rotating all API tokens as a precaution.

🔧 Temporary Workarounds

Account Deletion/Deactivation

all

Delete or deactivate user accounts associated with deleted API tokens to prevent those tokens from authenticating successfully.

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit Infrahub access to trusted sources only.
  • Enable comprehensive logging and monitoring for authentication attempts, particularly with revoked tokens.

🔍 How to Verify

Check if Vulnerable:

Check if your Infrahub version is below 1.3.9 or 1.4.5. Test by attempting to authenticate with a recently deleted API token.

Check Version:

Check Infrahub web interface or API for version information, or inspect deployment configuration files.

Verify Fix Applied:

After updating, attempt to authenticate with a deleted API token - it should be rejected. Verify the version shows 1.3.9 or 1.4.5.

📡 Detection & Monitoring

Log Indicators:

  • Authentication attempts with recently revoked tokens
  • Successful logins from tokens marked as expired or deleted
  • Unusual authentication patterns from known user accounts

Network Indicators:

  • API requests using tokens that should be invalid
  • Authentication traffic from unexpected sources

SIEM Query:

source="infrahub" AND (event_type="authentication" OR event_type="login") AND (token_status="revoked" OR token_status="expired") AND result="success"

🔗 References

📤 Share & Export