CVE-2022-36089: CWE-294: Authentication Bypass by Capture-replay in kubevela kubevela
KubeVela is an application delivery platform Users using KubeVela's VelaUX APIServer could be affected by an authentication bypass vulnerability. In KubeVela prior to versions 1.4.11 and 1.5.4, VelaUX APIServer uses the `PlatformID` as the signed key to generate the JWT tokens for users. Another API called `getSystemInfo` exposes the platformID. This vulnerability allows users to use the platformID to re-generate the JWT tokens to bypass the authentication. Versions 1.4.11 and 1.5.4 contain a patch for this issue.
AI Analysis
Technical Summary
CVE-2022-36089 is an authentication bypass vulnerability affecting KubeVela, an application delivery platform widely used for managing cloud-native applications. The vulnerability specifically targets the VelaUX APIServer component in KubeVela versions prior to 1.4.11 and 1.5.4. The root cause lies in the way JWT tokens are generated and validated. The VelaUX APIServer uses the 'PlatformID' as the signing key for JWT tokens. However, the 'getSystemInfo' API endpoint exposes this PlatformID publicly. An attacker can retrieve the PlatformID from this endpoint and use it to forge valid JWT tokens, effectively bypassing authentication controls. This allows unauthorized users to impersonate legitimate users and gain access to the system without valid credentials. The vulnerability is classified under CWE-294 (Authentication Bypass by Capture-replay), indicating that the attacker replays or reuses captured authentication material (PlatformID) to bypass security. The issue was patched in versions 1.4.11 and 1.5.4 by changing the token signing mechanism to prevent exposure and misuse of the PlatformID. There are no known exploits in the wild reported as of the publication date (September 7, 2022). However, the vulnerability presents a significant risk due to the ease of obtaining the signing key and forging tokens without authentication or user interaction. The affected versions include 1.4.0 up to but not including 1.4.11, and 1.5.0 up to but not including 1.5.3.
Potential Impact
For European organizations using KubeVela, especially those deploying cloud-native applications or managing complex application delivery pipelines, this vulnerability poses a serious risk. An attacker exploiting this flaw can gain unauthorized access to the VelaUX APIServer, potentially allowing them to manipulate application deployments, access sensitive configuration data, or disrupt service availability. This could lead to data breaches, service outages, or unauthorized changes to critical infrastructure. Given that KubeVela is often integrated into DevOps workflows and cloud environments, compromise of its authentication mechanism could cascade into broader cloud infrastructure compromise. The impact on confidentiality is high due to unauthorized access; integrity is at risk because attackers can modify deployment configurations; availability could be affected if attackers disrupt or disable application delivery. The ease of exploitation (no authentication or user interaction needed) increases the threat level. While no active exploitation is reported, the vulnerability's presence in production environments could attract attackers seeking to leverage it for lateral movement or persistent access. European organizations in sectors with high cloud adoption, such as finance, telecommunications, and critical infrastructure, are particularly at risk.
Mitigation Recommendations
1. Immediate upgrade of KubeVela to patched versions 1.4.11 or 1.5.4 is the most effective mitigation. 2. If upgrading is not immediately feasible, restrict access to the VelaUX APIServer API endpoints, especially 'getSystemInfo', via network segmentation, firewall rules, or API gateway policies to prevent unauthorized retrieval of the PlatformID. 3. Implement strict authentication and authorization controls around the API server, including IP whitelisting and mutual TLS where possible. 4. Monitor API server logs for unusual JWT token generation or authentication attempts that could indicate exploitation attempts. 5. Conduct a thorough audit of existing deployments to identify any unauthorized access or changes that may have occurred. 6. Employ runtime security tools to detect anomalous behavior in application delivery pipelines. 7. Educate DevOps and security teams about this vulnerability to ensure rapid response and patch management. 8. Consider implementing additional layers of token validation or rotating signing keys if supported by the platform to reduce risk of token forgery.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2022-36089: CWE-294: Authentication Bypass by Capture-replay in kubevela kubevela
Description
KubeVela is an application delivery platform Users using KubeVela's VelaUX APIServer could be affected by an authentication bypass vulnerability. In KubeVela prior to versions 1.4.11 and 1.5.4, VelaUX APIServer uses the `PlatformID` as the signed key to generate the JWT tokens for users. Another API called `getSystemInfo` exposes the platformID. This vulnerability allows users to use the platformID to re-generate the JWT tokens to bypass the authentication. Versions 1.4.11 and 1.5.4 contain a patch for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-36089 is an authentication bypass vulnerability affecting KubeVela, an application delivery platform widely used for managing cloud-native applications. The vulnerability specifically targets the VelaUX APIServer component in KubeVela versions prior to 1.4.11 and 1.5.4. The root cause lies in the way JWT tokens are generated and validated. The VelaUX APIServer uses the 'PlatformID' as the signing key for JWT tokens. However, the 'getSystemInfo' API endpoint exposes this PlatformID publicly. An attacker can retrieve the PlatformID from this endpoint and use it to forge valid JWT tokens, effectively bypassing authentication controls. This allows unauthorized users to impersonate legitimate users and gain access to the system without valid credentials. The vulnerability is classified under CWE-294 (Authentication Bypass by Capture-replay), indicating that the attacker replays or reuses captured authentication material (PlatformID) to bypass security. The issue was patched in versions 1.4.11 and 1.5.4 by changing the token signing mechanism to prevent exposure and misuse of the PlatformID. There are no known exploits in the wild reported as of the publication date (September 7, 2022). However, the vulnerability presents a significant risk due to the ease of obtaining the signing key and forging tokens without authentication or user interaction. The affected versions include 1.4.0 up to but not including 1.4.11, and 1.5.0 up to but not including 1.5.3.
Potential Impact
For European organizations using KubeVela, especially those deploying cloud-native applications or managing complex application delivery pipelines, this vulnerability poses a serious risk. An attacker exploiting this flaw can gain unauthorized access to the VelaUX APIServer, potentially allowing them to manipulate application deployments, access sensitive configuration data, or disrupt service availability. This could lead to data breaches, service outages, or unauthorized changes to critical infrastructure. Given that KubeVela is often integrated into DevOps workflows and cloud environments, compromise of its authentication mechanism could cascade into broader cloud infrastructure compromise. The impact on confidentiality is high due to unauthorized access; integrity is at risk because attackers can modify deployment configurations; availability could be affected if attackers disrupt or disable application delivery. The ease of exploitation (no authentication or user interaction needed) increases the threat level. While no active exploitation is reported, the vulnerability's presence in production environments could attract attackers seeking to leverage it for lateral movement or persistent access. European organizations in sectors with high cloud adoption, such as finance, telecommunications, and critical infrastructure, are particularly at risk.
Mitigation Recommendations
1. Immediate upgrade of KubeVela to patched versions 1.4.11 or 1.5.4 is the most effective mitigation. 2. If upgrading is not immediately feasible, restrict access to the VelaUX APIServer API endpoints, especially 'getSystemInfo', via network segmentation, firewall rules, or API gateway policies to prevent unauthorized retrieval of the PlatformID. 3. Implement strict authentication and authorization controls around the API server, including IP whitelisting and mutual TLS where possible. 4. Monitor API server logs for unusual JWT token generation or authentication attempts that could indicate exploitation attempts. 5. Conduct a thorough audit of existing deployments to identify any unauthorized access or changes that may have occurred. 6. Employ runtime security tools to detect anomalous behavior in application delivery pipelines. 7. Educate DevOps and security teams about this vulnerability to ensure rapid response and patch management. 8. Consider implementing additional layers of token validation or rotating signing keys if supported by the platform to reduce risk of token forgery.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf3dce
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/22/2025, 10:06:48 PM
Last updated: 2/4/2026, 1:20:18 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1835: Cross-Site Request Forgery in lcg0124 BootDo
MediumCVE-2026-1813: Unrestricted Upload in bolo-blog bolo-solo
MediumCVE-2026-1632: CWE-306 Missing Authentication for Critical Function in RISS SRL MOMA Seismic Station
CriticalCVE-2026-1812: Path Traversal in bolo-blog bolo-solo
MediumCVE-2026-24514: CWE-770 Allocation of Resources Without Limits or Throttling in Kubernetes ingress-nginx
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.