CVE-2025-66223

N/A Unknown

📋 TL;DR

OpenObserve versions before 0.16.0 have an access control vulnerability where organization invitation tokens never expire, remain valid after user removal, and allow multiple active invitations. This allows removed or demoted users to regain access or escalate privileges. Organizations using OpenObserve for observability are affected.

💻 Affected Systems

Products:
  • OpenObserve
Versions: All versions prior to 0.16.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using organization invitations are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

A malicious former user could regain administrative access to the observability platform, potentially accessing sensitive telemetry data, modifying configurations, or disrupting monitoring operations.

🟠

Likely Case

A former employee or contractor uses an old invitation link to regain access to organizational data they should no longer have access to, potentially violating data privacy policies.

🟢

If Mitigated

With proper monitoring and user lifecycle management, unauthorized access attempts would be detected and logged, limiting damage to potential data exposure.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires possession of an invitation token, which could be obtained through legitimate means before user removal or through social engineering.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.16.0

Vendor Advisory: https://github.com/openobserve/openobserve/security/advisories/GHSA-c856-2xpx-gw75

Restart Required: Yes

Instructions:

1. Backup your OpenObserve configuration and data. 2. Stop the OpenObserve service. 3. Update to version 0.16.0 or later using your deployment method (Docker, Kubernetes, binary). 4. Restart the service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Manual Token Invalidation

all

Manually revoke all existing invitation tokens and reissue new ones

# Requires administrative access to OpenObserve database
# SQL to invalidate tokens: UPDATE invitation_tokens SET valid = false WHERE created_at < NOW();

🧯 If You Can't Patch

  • Implement strict monitoring of user access logs for unexpected login attempts from removed users.
  • Establish a process to manually revoke all invitation tokens whenever a user is removed from the organization.

🔍 How to Verify

Check if Vulnerable:

Check if your OpenObserve version is below 0.16.0 using the version API endpoint or interface.

Check Version:

curl -X GET http://your-openobserve-server:5080/api/version

Verify Fix Applied:

After updating to 0.16.0, test that invitation tokens expire properly and are invalidated when users are removed.

📡 Detection & Monitoring

Log Indicators:

  • User login from previously removed email addresses
  • Multiple successful logins from the same invitation token
  • Role escalation events without proper authorization

Network Indicators:

  • Unusual API calls to invitation endpoints from unexpected sources

SIEM Query:

source="openobserve" (event="user_login" AND user_email IN (SELECT removed_users FROM hr_system)) OR (event="role_change" AND NOT auth_method="admin_console")

🔗 References

📤 Share & Export