CVE-2023-6394: Missing Authorization in Red Hat Red Hat build of Quarkus 2.13.9.Final
A flaw was found in Quarkus. This issue occurs when receiving a request over websocket with no role-based permission specified on the GraphQL operation, Quarkus processes the request without authentication despite the endpoint being secured. This can allow an attacker to access information and functionality outside of normal granted API permissions.
AI Analysis
Technical Summary
CVE-2023-6394 is a security vulnerability identified in the Red Hat build of Quarkus version 2.13.9.Final, specifically affecting GraphQL operations over websocket connections. The root cause is a missing authorization check when a GraphQL operation does not specify any role-based permission. Under normal circumstances, secured endpoints require authentication and authorization to ensure only permitted users can access certain API functionalities. However, due to this flaw, Quarkus processes such websocket requests without enforcing authentication, effectively allowing unauthenticated users to invoke GraphQL operations that should be protected. This bypass of access control can lead to unauthorized access to sensitive information and functionality, compromising confidentiality and integrity of the affected systems. The vulnerability has a CVSS 3.1 base score of 7.4, indicating high severity, with network attack vector, no privileges required, no user interaction, and high impact on confidentiality and integrity but no impact on availability. Although no known exploits are reported in the wild yet, the nature of the flaw makes it a significant risk for applications using this Quarkus build, especially those exposing GraphQL APIs over websockets. The lack of explicit role-based permissions on GraphQL operations is the trigger condition, so applications that do not strictly define permissions on all operations are particularly vulnerable. The issue was published on December 9, 2023, and no patch links were provided at the time, indicating that organizations should monitor Red Hat advisories closely for updates. This vulnerability highlights the importance of explicit authorization checks in API frameworks and the risks of implicit trust in unsecured websocket communications.
Potential Impact
For European organizations, the impact of CVE-2023-6394 can be significant, especially for those deploying cloud-native applications using Red Hat's Quarkus framework with GraphQL APIs over websockets. Unauthorized access to sensitive data or critical functionality can lead to data breaches, intellectual property theft, or unauthorized manipulation of business logic. Confidentiality and integrity are at high risk, potentially affecting customer data, internal systems, and compliance with data protection regulations such as GDPR. The vulnerability could also undermine trust in digital services and lead to financial and reputational damage. Since the attack vector is network-based and requires no authentication or user interaction, exploitation could be automated and widespread if attackers develop exploits. The lack of availability impact reduces the risk of service disruption but does not diminish the seriousness of unauthorized data access. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on Quarkus for API services are particularly vulnerable. The timing of patch availability and the speed of deployment will critically influence the extent of impact.
Mitigation Recommendations
1. Monitor Red Hat security advisories and apply official patches or updates for Quarkus 2.13.9.Final as soon as they become available. 2. Conduct a thorough audit of all GraphQL operations exposed over websockets to ensure explicit role-based permissions are defined and enforced. 3. Implement additional access control mechanisms at the API gateway or reverse proxy level to restrict unauthenticated websocket connections. 4. Use network segmentation and firewall rules to limit exposure of websocket endpoints to trusted networks or authenticated users only. 5. Employ runtime application self-protection (RASP) or Web Application Firewalls (WAFs) capable of detecting and blocking unauthorized GraphQL requests. 6. Review and enhance logging and monitoring for websocket connections and GraphQL operations to detect anomalous or unauthorized access attempts. 7. Educate development teams on secure API design principles, emphasizing the necessity of explicit authorization checks on all operations. 8. If immediate patching is not possible, consider disabling websocket support for GraphQL or restricting its use until a fix is applied.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2023-6394: Missing Authorization in Red Hat Red Hat build of Quarkus 2.13.9.Final
Description
A flaw was found in Quarkus. This issue occurs when receiving a request over websocket with no role-based permission specified on the GraphQL operation, Quarkus processes the request without authentication despite the endpoint being secured. This can allow an attacker to access information and functionality outside of normal granted API permissions.
AI-Powered Analysis
Technical Analysis
CVE-2023-6394 is a security vulnerability identified in the Red Hat build of Quarkus version 2.13.9.Final, specifically affecting GraphQL operations over websocket connections. The root cause is a missing authorization check when a GraphQL operation does not specify any role-based permission. Under normal circumstances, secured endpoints require authentication and authorization to ensure only permitted users can access certain API functionalities. However, due to this flaw, Quarkus processes such websocket requests without enforcing authentication, effectively allowing unauthenticated users to invoke GraphQL operations that should be protected. This bypass of access control can lead to unauthorized access to sensitive information and functionality, compromising confidentiality and integrity of the affected systems. The vulnerability has a CVSS 3.1 base score of 7.4, indicating high severity, with network attack vector, no privileges required, no user interaction, and high impact on confidentiality and integrity but no impact on availability. Although no known exploits are reported in the wild yet, the nature of the flaw makes it a significant risk for applications using this Quarkus build, especially those exposing GraphQL APIs over websockets. The lack of explicit role-based permissions on GraphQL operations is the trigger condition, so applications that do not strictly define permissions on all operations are particularly vulnerable. The issue was published on December 9, 2023, and no patch links were provided at the time, indicating that organizations should monitor Red Hat advisories closely for updates. This vulnerability highlights the importance of explicit authorization checks in API frameworks and the risks of implicit trust in unsecured websocket communications.
Potential Impact
For European organizations, the impact of CVE-2023-6394 can be significant, especially for those deploying cloud-native applications using Red Hat's Quarkus framework with GraphQL APIs over websockets. Unauthorized access to sensitive data or critical functionality can lead to data breaches, intellectual property theft, or unauthorized manipulation of business logic. Confidentiality and integrity are at high risk, potentially affecting customer data, internal systems, and compliance with data protection regulations such as GDPR. The vulnerability could also undermine trust in digital services and lead to financial and reputational damage. Since the attack vector is network-based and requires no authentication or user interaction, exploitation could be automated and widespread if attackers develop exploits. The lack of availability impact reduces the risk of service disruption but does not diminish the seriousness of unauthorized data access. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on Quarkus for API services are particularly vulnerable. The timing of patch availability and the speed of deployment will critically influence the extent of impact.
Mitigation Recommendations
1. Monitor Red Hat security advisories and apply official patches or updates for Quarkus 2.13.9.Final as soon as they become available. 2. Conduct a thorough audit of all GraphQL operations exposed over websockets to ensure explicit role-based permissions are defined and enforced. 3. Implement additional access control mechanisms at the API gateway or reverse proxy level to restrict unauthenticated websocket connections. 4. Use network segmentation and firewall rules to limit exposure of websocket endpoints to trusted networks or authenticated users only. 5. Employ runtime application self-protection (RASP) or Web Application Firewalls (WAFs) capable of detecting and blocking unauthorized GraphQL requests. 6. Review and enhance logging and monitoring for websocket connections and GraphQL operations to detect anomalous or unauthorized access attempts. 7. Educate development teams on secure API design principles, emphasizing the necessity of explicit authorization checks on all operations. 8. If immediate patching is not possible, consider disabling websocket support for GraphQL or restricting its use until a fix is applied.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2023-11-30T04:05:52.129Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e7a23aba0e608b4f980f61
Added to database: 10/9/2025, 11:53:30 AM
Last enriched: 11/20/2025, 7:57:39 AM
Last updated: 11/24/2025, 5:06:28 AM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13582: SQL Injection in code-projects Jonnys Liquor
MediumCVE-2025-7402: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in scripteo Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager
HighCVE-2025-13583: SQL Injection in code-projects Question Paper Generator
MediumCVE-2025-13576: Improper Authorization in code-projects Blog Site
MediumCVE-2025-13589: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Otsuka Information Technology FMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.