Skip to main content

CVE-2025-58366: CWE-522: Insufficiently Protected Credentials in InseeFrLab onyxia

Critical
VulnerabilityCVE-2025-58366cvecve-2025-58366cwe-522
Published: Fri Sep 05 2025 (09/05/2025, 21:29:46 UTC)
Source: CVE Database V5
Vendor/Project: InseeFrLab
Product: onyxia

Description

Onyxia is a data science environment for kubernetes. In versions 4.6.0 through 4.8.0, Onyxia-API leaked the credentials of private helm repositories in the public (unauthenticated) /public/catalogs endpoint.vOnly instances using private helm repositories (i.e setting username & password in the catalogs configuration) are affected. This is fixed in version 4.9.0.

AI-Powered Analysis

AILast updated: 09/05/2025, 21:57:36 UTC

Technical Analysis

CVE-2025-58366 is a critical vulnerability affecting Onyxia, a data science environment designed for Kubernetes, developed by InseeFrLab. The vulnerability exists in versions 4.6.0 through 4.8.0 of Onyxia-API, where the /public/catalogs endpoint, which is unauthenticated and publicly accessible, leaks credentials for private Helm repositories. This occurs when private Helm repositories are configured with usernames and passwords in the catalogs configuration. The exposure of these credentials allows an attacker to gain unauthorized access to private Helm repositories, potentially enabling them to retrieve or manipulate private charts and software packages. The vulnerability is classified under CWE-522 (Insufficiently Protected Credentials), indicating that sensitive credential information is not adequately safeguarded. The CVSS 4.0 score is 9.4 (critical), reflecting the high impact and ease of exploitation: the attack vector is network-based with no user interaction required, and no privileges or authentication are necessary to exploit the flaw. The vulnerability affects the confidentiality and integrity of private Helm repository credentials, and the scope is high because it affects all instances of Onyxia using private Helm repositories within the specified version range. The issue was fixed in version 4.9.0. There are no known exploits in the wild at the time of publication, but the critical severity and public exposure of the endpoint make it a significant risk for affected users.

Potential Impact

For European organizations using Onyxia versions 4.6.0 through 4.8.0 with private Helm repositories, this vulnerability poses a severe risk. The leakage of private Helm repository credentials can lead to unauthorized access to proprietary or sensitive software packages, potentially allowing attackers to inject malicious code or disrupt software supply chains. This can compromise the integrity of data science workflows and Kubernetes deployments, leading to operational disruptions and data breaches. Organizations relying on Onyxia for critical data science tasks may face significant downtime and loss of trust if attackers exploit this vulnerability. Furthermore, the exposure of credentials could facilitate lateral movement within the network or provide a foothold for further attacks. Given the increasing adoption of Kubernetes and Helm in European enterprises and research institutions, especially in sectors like finance, healthcare, and government, the impact could be widespread and damaging.

Mitigation Recommendations

European organizations should immediately upgrade Onyxia to version 4.9.0 or later, where the vulnerability is patched. Until the upgrade is performed, organizations should audit their Onyxia deployments to identify any use of private Helm repositories and consider disabling or restricting access to the /public/catalogs endpoint if possible. Implement network-level access controls to limit exposure of the Onyxia API to trusted internal networks only. Additionally, rotate credentials for private Helm repositories that may have been exposed to prevent unauthorized access. Employ monitoring and logging to detect unusual access patterns to Helm repositories and Onyxia APIs. Organizations should also review their Helm repository configurations to ensure credentials are stored and transmitted securely, using secrets management solutions integrated with Kubernetes. Finally, conduct security awareness training for DevOps and platform teams to recognize and remediate such credential exposure risks proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-29T16:19:59.012Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68bb594d535f4a97730f6c29

Added to database: 9/5/2025, 9:42:37 PM

Last enriched: 9/5/2025, 9:57:36 PM

Last updated: 9/6/2025, 12:16:32 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats