CVE-2023-5675: Improper Authorization
A flaw was found in Quarkus. When a Quarkus RestEasy Classic or Reactive JAX-RS endpoint has its methods declared in the abstract Java class or customized by Quarkus extensions using the annotation processor, the authorization of these methods will not be enforced if it is enabled by either 'quarkus.security.jaxrs.deny-unannotated-endpoints' or 'quarkus.security.jaxrs.default-roles-allowed' properties.
AI Analysis
Technical Summary
CVE-2023-5675 is a security vulnerability identified in the Quarkus framework, specifically affecting versions 3.2.0, 3.6.0, and 3.7.0. Quarkus is a popular Java framework used for building cloud-native applications, often leveraging RESTEasy Classic or Reactive JAX-RS for RESTful endpoints. The vulnerability arises when REST endpoint methods are declared in abstract Java classes or are customized via Quarkus extensions using annotation processors. Under these conditions, the framework fails to enforce authorization policies configured via 'quarkus.security.jaxrs.deny-unannotated-endpoints' or 'quarkus.security.jaxrs.default-roles-allowed' properties. These properties are intended to restrict access to endpoints by denying unannotated endpoints or enforcing default role-based access control. Due to this flaw, protected methods can be accessed without proper authorization checks, effectively bypassing security controls. The CVSS 3.1 base score is 6.5 (medium severity), reflecting that the vulnerability can be exploited remotely without authentication or user interaction, impacting confidentiality and integrity but not availability. No known exploits have been reported in the wild as of the publication date. This vulnerability is particularly critical for applications exposing sensitive data or critical business logic via REST endpoints, as unauthorized access could lead to data leakage or unauthorized operations. The issue stems from the interaction between abstract method declarations, annotation processing, and Quarkus security enforcement mechanisms, highlighting a gap in the framework's security model. Organizations using affected Quarkus versions should review their endpoint security configurations and apply patches or mitigations once available.
Potential Impact
The primary impact of CVE-2023-5675 is unauthorized access to REST endpoints that should be protected by role-based authorization policies. For European organizations, this could lead to unauthorized disclosure of sensitive information, unauthorized modification of data, or execution of privileged operations within applications built on vulnerable Quarkus versions. Industries such as finance, healthcare, government, and critical infrastructure that rely on Java microservices for business-critical operations are at heightened risk. The vulnerability undermines the confidentiality and integrity of application data and services, potentially leading to regulatory non-compliance (e.g., GDPR violations) if personal or sensitive data is exposed. Since exploitation requires no authentication or user interaction and can be performed remotely, attackers can leverage this flaw to gain unauthorized access at scale. This could facilitate further lateral movement or escalation within affected networks. The lack of known exploits in the wild currently reduces immediate risk, but the medium severity score and ease of exploitation warrant proactive mitigation. European organizations with public-facing APIs or internal services using Quarkus should consider this a significant security concern.
Mitigation Recommendations
To mitigate CVE-2023-5675, European organizations should: 1) Upgrade Quarkus to a patched version as soon as it becomes available from the vendor or community, ensuring the fix addresses authorization enforcement on abstract or annotated methods. 2) Review and audit all REST endpoints, especially those declared in abstract classes or customized via annotation processors, to verify that authorization annotations are correctly applied and enforced. 3) Temporarily disable or avoid using the 'quarkus.security.jaxrs.deny-unannotated-endpoints' and 'quarkus.security.jaxrs.default-roles-allowed' properties if they cannot be reliably enforced, or implement additional manual authorization checks in code. 4) Employ runtime application self-protection (RASP) or API gateways with strict access control policies to add defense-in-depth. 5) Conduct penetration testing focused on authorization bypass scenarios to detect potential exploitation. 6) Monitor application logs and network traffic for unusual access patterns to REST endpoints. 7) Educate developers about secure use of abstract classes and annotation processors in Quarkus to prevent similar issues. These steps go beyond generic patching by emphasizing configuration review, code auditing, and layered security controls.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2023-5675: Improper Authorization
Description
A flaw was found in Quarkus. When a Quarkus RestEasy Classic or Reactive JAX-RS endpoint has its methods declared in the abstract Java class or customized by Quarkus extensions using the annotation processor, the authorization of these methods will not be enforced if it is enabled by either 'quarkus.security.jaxrs.deny-unannotated-endpoints' or 'quarkus.security.jaxrs.default-roles-allowed' properties.
AI-Powered Analysis
Technical Analysis
CVE-2023-5675 is a security vulnerability identified in the Quarkus framework, specifically affecting versions 3.2.0, 3.6.0, and 3.7.0. Quarkus is a popular Java framework used for building cloud-native applications, often leveraging RESTEasy Classic or Reactive JAX-RS for RESTful endpoints. The vulnerability arises when REST endpoint methods are declared in abstract Java classes or are customized via Quarkus extensions using annotation processors. Under these conditions, the framework fails to enforce authorization policies configured via 'quarkus.security.jaxrs.deny-unannotated-endpoints' or 'quarkus.security.jaxrs.default-roles-allowed' properties. These properties are intended to restrict access to endpoints by denying unannotated endpoints or enforcing default role-based access control. Due to this flaw, protected methods can be accessed without proper authorization checks, effectively bypassing security controls. The CVSS 3.1 base score is 6.5 (medium severity), reflecting that the vulnerability can be exploited remotely without authentication or user interaction, impacting confidentiality and integrity but not availability. No known exploits have been reported in the wild as of the publication date. This vulnerability is particularly critical for applications exposing sensitive data or critical business logic via REST endpoints, as unauthorized access could lead to data leakage or unauthorized operations. The issue stems from the interaction between abstract method declarations, annotation processing, and Quarkus security enforcement mechanisms, highlighting a gap in the framework's security model. Organizations using affected Quarkus versions should review their endpoint security configurations and apply patches or mitigations once available.
Potential Impact
The primary impact of CVE-2023-5675 is unauthorized access to REST endpoints that should be protected by role-based authorization policies. For European organizations, this could lead to unauthorized disclosure of sensitive information, unauthorized modification of data, or execution of privileged operations within applications built on vulnerable Quarkus versions. Industries such as finance, healthcare, government, and critical infrastructure that rely on Java microservices for business-critical operations are at heightened risk. The vulnerability undermines the confidentiality and integrity of application data and services, potentially leading to regulatory non-compliance (e.g., GDPR violations) if personal or sensitive data is exposed. Since exploitation requires no authentication or user interaction and can be performed remotely, attackers can leverage this flaw to gain unauthorized access at scale. This could facilitate further lateral movement or escalation within affected networks. The lack of known exploits in the wild currently reduces immediate risk, but the medium severity score and ease of exploitation warrant proactive mitigation. European organizations with public-facing APIs or internal services using Quarkus should consider this a significant security concern.
Mitigation Recommendations
To mitigate CVE-2023-5675, European organizations should: 1) Upgrade Quarkus to a patched version as soon as it becomes available from the vendor or community, ensuring the fix addresses authorization enforcement on abstract or annotated methods. 2) Review and audit all REST endpoints, especially those declared in abstract classes or customized via annotation processors, to verify that authorization annotations are correctly applied and enforced. 3) Temporarily disable or avoid using the 'quarkus.security.jaxrs.deny-unannotated-endpoints' and 'quarkus.security.jaxrs.default-roles-allowed' properties if they cannot be reliably enforced, or implement additional manual authorization checks in code. 4) Employ runtime application self-protection (RASP) or API gateways with strict access control policies to add defense-in-depth. 5) Conduct penetration testing focused on authorization bypass scenarios to detect potential exploitation. 6) Monitor application logs and network traffic for unusual access patterns to REST endpoints. 7) Educate developers about secure use of abstract classes and annotation processors in Quarkus to prevent similar issues. These steps go beyond generic patching by emphasizing configuration review, code auditing, and layered security controls.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2023-10-20T04:42:22.947Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691f5c4ce672cd9080e8d3a6
Added to database: 11/20/2025, 6:22:04 PM
Last enriched: 11/20/2025, 6:45:22 PM
Last updated: 11/21/2025, 2:18:32 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11127: CWE-639 Authorization Bypass Through User-Controlled Key in Mstoreapp Mobile App
UnknownSliver C2 vulnerability enables attack on C2 operators through insecure Wireguard network
MediumCVE-2025-66115: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in MatrixAddons Easy Invoice
UnknownCVE-2025-66114: Missing Authorization in theme funda Show Variations as Single Products Woocommerce
UnknownCVE-2025-66113: Missing Authorization in ThemeAtelier Better Chat Support for Messenger
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.