CVE-2025-58366: CWE-522: Insufficiently Protected Credentials in InseeFrLab onyxia
Onyxia is a data science environment for kubernetes. In versions 4.6.0 through 4.8.0, Onyxia-API leaked the credentials of private helm repositories in the public (unauthenticated) /public/catalogs endpoint.vOnly instances using private helm repositories (i.e setting username & password in the catalogs configuration) are affected. This is fixed in version 4.9.0.
AI Analysis
Technical Summary
CVE-2025-58366 is a critical vulnerability affecting Onyxia, a data science environment designed for Kubernetes, developed by InseeFrLab. The vulnerability exists in versions 4.6.0 through 4.8.0 of Onyxia-API, where the /public/catalogs endpoint, which is publicly accessible without authentication, inadvertently exposes credentials for private Helm repositories. Specifically, when private Helm repositories are configured with usernames and passwords in the catalogs configuration, these sensitive credentials are leaked through this unauthenticated endpoint. This exposure allows any unauthenticated attacker to retrieve private repository credentials, potentially enabling unauthorized access to private Helm charts and related resources. The vulnerability is classified under CWE-522, indicating insufficiently protected credentials. The CVSS 4.0 score is 9.4 (critical), reflecting the high impact on confidentiality and integrity, ease of exploitation (network attack vector, no user interaction required), and the broad scope of affected systems using private Helm repositories. The vulnerability does not require prior authentication, making it highly exploitable remotely. The issue has been addressed in Onyxia version 4.9.0, where the credentials leak has been fixed. No known exploits in the wild have been reported yet, but the critical severity and nature of the vulnerability suggest a high risk if left unpatched.
Potential Impact
For European organizations utilizing Onyxia in their Kubernetes environments, especially those relying on private Helm repositories for managing internal or proprietary software packages, this vulnerability poses a significant risk. Exposure of private Helm repository credentials can lead to unauthorized access to sensitive software packages, enabling attackers to inject malicious code, disrupt software supply chains, or exfiltrate intellectual property. This can compromise the integrity and confidentiality of the software deployment pipeline and potentially lead to broader system compromise if malicious Helm charts are deployed. The public availability of the vulnerable endpoint means attackers can exploit this without any authentication, increasing the likelihood of exploitation. Organizations in sectors with high reliance on data science and Kubernetes orchestration, such as finance, healthcare, research institutions, and critical infrastructure, may face severe operational and reputational damage. Additionally, regulatory compliance risks arise due to potential data breaches involving sensitive credentials, which could trigger GDPR-related penalties.
Mitigation Recommendations
1. Immediate upgrade of Onyxia to version 4.9.0 or later, where the vulnerability is patched, is the most effective mitigation. 2. Until the upgrade is applied, restrict access to the /public/catalogs endpoint via network-level controls such as firewalls or API gateways to limit exposure to trusted users only. 3. Review and rotate all credentials for private Helm repositories that were potentially exposed through the vulnerable endpoint to prevent unauthorized access. 4. Implement strict access controls and monitoring on private Helm repositories to detect any unauthorized access or anomalous activity. 5. Employ Kubernetes network policies to limit external access to Onyxia APIs and endpoints. 6. Conduct an audit of all Onyxia deployments to identify instances using private Helm repositories and verify they are updated or mitigated accordingly. 7. Educate DevOps and security teams about the risks of exposing sensitive credentials in publicly accessible endpoints and enforce secure configuration management practices.
Affected Countries
France, Germany, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-58366: CWE-522: Insufficiently Protected Credentials in InseeFrLab onyxia
Description
Onyxia is a data science environment for kubernetes. In versions 4.6.0 through 4.8.0, Onyxia-API leaked the credentials of private helm repositories in the public (unauthenticated) /public/catalogs endpoint.vOnly instances using private helm repositories (i.e setting username & password in the catalogs configuration) are affected. This is fixed in version 4.9.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-58366 is a critical vulnerability affecting Onyxia, a data science environment designed for Kubernetes, developed by InseeFrLab. The vulnerability exists in versions 4.6.0 through 4.8.0 of Onyxia-API, where the /public/catalogs endpoint, which is publicly accessible without authentication, inadvertently exposes credentials for private Helm repositories. Specifically, when private Helm repositories are configured with usernames and passwords in the catalogs configuration, these sensitive credentials are leaked through this unauthenticated endpoint. This exposure allows any unauthenticated attacker to retrieve private repository credentials, potentially enabling unauthorized access to private Helm charts and related resources. The vulnerability is classified under CWE-522, indicating insufficiently protected credentials. The CVSS 4.0 score is 9.4 (critical), reflecting the high impact on confidentiality and integrity, ease of exploitation (network attack vector, no user interaction required), and the broad scope of affected systems using private Helm repositories. The vulnerability does not require prior authentication, making it highly exploitable remotely. The issue has been addressed in Onyxia version 4.9.0, where the credentials leak has been fixed. No known exploits in the wild have been reported yet, but the critical severity and nature of the vulnerability suggest a high risk if left unpatched.
Potential Impact
For European organizations utilizing Onyxia in their Kubernetes environments, especially those relying on private Helm repositories for managing internal or proprietary software packages, this vulnerability poses a significant risk. Exposure of private Helm repository credentials can lead to unauthorized access to sensitive software packages, enabling attackers to inject malicious code, disrupt software supply chains, or exfiltrate intellectual property. This can compromise the integrity and confidentiality of the software deployment pipeline and potentially lead to broader system compromise if malicious Helm charts are deployed. The public availability of the vulnerable endpoint means attackers can exploit this without any authentication, increasing the likelihood of exploitation. Organizations in sectors with high reliance on data science and Kubernetes orchestration, such as finance, healthcare, research institutions, and critical infrastructure, may face severe operational and reputational damage. Additionally, regulatory compliance risks arise due to potential data breaches involving sensitive credentials, which could trigger GDPR-related penalties.
Mitigation Recommendations
1. Immediate upgrade of Onyxia to version 4.9.0 or later, where the vulnerability is patched, is the most effective mitigation. 2. Until the upgrade is applied, restrict access to the /public/catalogs endpoint via network-level controls such as firewalls or API gateways to limit exposure to trusted users only. 3. Review and rotate all credentials for private Helm repositories that were potentially exposed through the vulnerable endpoint to prevent unauthorized access. 4. Implement strict access controls and monitoring on private Helm repositories to detect any unauthorized access or anomalous activity. 5. Employ Kubernetes network policies to limit external access to Onyxia APIs and endpoints. 6. Conduct an audit of all Onyxia deployments to identify instances using private Helm repositories and verify they are updated or mitigated accordingly. 7. Educate DevOps and security teams about the risks of exposing sensitive credentials in publicly accessible endpoints and enforce secure configuration management practices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-29T16:19:59.012Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68bb594d535f4a97730f6c29
Added to database: 9/5/2025, 9:42:37 PM
Last enriched: 9/12/2025, 11:54:05 PM
Last updated: 10/21/2025, 12:41:05 AM
Views: 77
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12001: CWE-20 Improper Input Validation in Azure Access Technology BLU-IC2
CriticalOver 75,000 WatchGuard security devices vulnerable to critical RCE
CriticalCVE-2025-11536: CWE-918 Server-Side Request Forgery (SSRF) in bdthemes Element Pack Addons for Elementor
MediumCVE-2025-54764: n/a
UnknownCVE-2025-61303: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.