Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54888: CWE-287: Improper Authentication in fedify-dev fedify

0
High
VulnerabilityCVE-2025-54888cvecve-2025-54888cwe-287cwe-863
Published: Sat Aug 09 2025 (08/09/2025, 01:31:53 UTC)
Source: CVE Database V5
Vendor/Project: fedify-dev
Product: fedify

Description

Fedify is a TypeScript library for building federated server apps powered by ActivityPub. In versions below 1.3.20, 1.4.0-dev.585 through 1.4.12, 1.5.0-dev.636 through 1.5.4, 1.6.0-dev.754 through 1.6.7, 1.7.0-pr.251.885 through 1.7.8 and 1.8.0-dev.909 through 1.8.4, an authentication bypass vulnerability allows any unauthenticated attacker to impersonate any ActivityPub actor by sending forged activities signed with their own keys. Activities are processed before verifying the signing key belongs to the claimed actor, enabling complete actor impersonation across all Fedify instances. This is fixed in versions 1.3.20, 1.4.13, 1.5.5, 1.6.8, 1.7.9 and 1.8.5.

AI-Powered Analysis

AILast updated: 02/05/2026, 08:04:10 UTC

Technical Analysis

Fedify is a TypeScript library designed to facilitate the creation of federated server applications using the ActivityPub protocol, which enables decentralized social networking. CVE-2025-54888 identifies a critical authentication bypass vulnerability in Fedify versions prior to 1.3.20 and several development and release versions up to 1.8.4. The vulnerability stems from improper authentication (CWE-287) and insufficient verification of actor signatures (CWE-863). Specifically, Fedify processes incoming activities before confirming that the signing key actually belongs to the claimed ActivityPub actor. This logic flaw allows an unauthenticated attacker to craft and send forged activities signed with their own keys but claiming to be any other actor. Because the system accepts these forged activities without proper verification, the attacker can impersonate any user or service within the federated network. This impersonation can lead to unauthorized actions, misinformation propagation, and potential disruption of federated services. The vulnerability does not require any privileges or user interaction, making it trivially exploitable remotely over the network. The flaw affects a broad range of versions, including stable releases and development builds, emphasizing the need for widespread patching. The issue was publicly disclosed in August 2025 with a CVSS 4.0 base score of 8.7, reflecting its high impact on confidentiality and integrity, with no impact on availability. No known exploits have been reported in the wild yet, but the vulnerability’s characteristics make it a significant risk for any organization deploying Fedify-based ActivityPub services.

Potential Impact

For European organizations, the impact of CVE-2025-54888 is substantial, especially for those leveraging federated social networks, collaborative platforms, or decentralized communication systems built on ActivityPub and Fedify. Successful exploitation allows attackers to impersonate legitimate actors, potentially leading to unauthorized data access, manipulation of federated content, spreading misinformation, and undermining trust within federated communities. This could affect public sector entities, media organizations, and private enterprises relying on federated identity and communication. The impersonation could also facilitate further attacks such as phishing, social engineering, or lateral movement within federated environments. Given the decentralized nature of ActivityPub, compromised actors can propagate malicious activities across multiple interconnected instances, amplifying the damage. The vulnerability’s ease of exploitation without authentication or user interaction increases the risk of widespread abuse. Additionally, reputational damage and regulatory consequences under GDPR may arise if personal data is compromised or manipulated through impersonation.

Mitigation Recommendations

The primary mitigation is to upgrade all Fedify instances to the fixed versions: 1.3.20, 1.4.13, 1.5.5, 1.6.8, 1.7.9, or 1.8.5, depending on the version branch in use. Organizations should conduct an immediate inventory of Fedify deployments and apply patches without delay. Beyond patching, developers and administrators should audit the ActivityPub actor verification logic to ensure that activities are only processed after confirming the signing key ownership. Implement additional logging and monitoring for anomalous activity patterns indicative of impersonation attempts. Employ network-level controls to restrict access to Fedify endpoints where feasible. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block malformed or suspicious ActivityPub messages. Engage in threat hunting to identify any signs of exploitation or abuse. For federated networks, coordinate with peer instances to share indicators of compromise and strengthen collective defenses. Finally, educate users and administrators about the risks of actor impersonation and encourage vigilance.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-31T17:23:33.476Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6896a8c3ad5a09ad00085a7a

Added to database: 8/9/2025, 1:47:47 AM

Last enriched: 2/5/2026, 8:04:10 AM

Last updated: 2/7/2026, 12:00:12 PM

Views: 198

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats