CVE-2025-58366: CWE-522: Insufficiently Protected Credentials in InseeFrLab onyxia
Onyxia is a data science environment for kubernetes. In versions 4.6.0 through 4.8.0, Onyxia-API leaked the credentials of private helm repositories in the public (unauthenticated) /public/catalogs endpoint.vOnly instances using private helm repositories (i.e setting username & password in the catalogs configuration) are affected. This is fixed in version 4.9.0.
AI Analysis
Technical Summary
CVE-2025-58366 is a critical vulnerability affecting Onyxia, a data science environment designed for Kubernetes, developed by InseeFrLab. The vulnerability exists in versions 4.6.0 through 4.8.0 of Onyxia-API, where the /public/catalogs endpoint, which is unauthenticated and publicly accessible, leaks credentials for private Helm repositories. This occurs when private Helm repositories are configured with usernames and passwords in the catalogs configuration. The exposure of these credentials allows an attacker to gain unauthorized access to private Helm repositories, potentially enabling them to retrieve or manipulate private charts and software packages. The vulnerability is classified under CWE-522 (Insufficiently Protected Credentials), indicating that sensitive credential information is not adequately safeguarded. The CVSS 4.0 score is 9.4 (critical), reflecting the high impact and ease of exploitation: the attack vector is network-based with no user interaction required, and no privileges or authentication are necessary to exploit the flaw. The vulnerability affects the confidentiality and integrity of private Helm repository credentials, and the scope is high because it affects all instances of Onyxia using private Helm repositories within the specified version range. The issue was fixed in version 4.9.0. There are no known exploits in the wild at the time of publication, but the critical severity and public exposure of the endpoint make it a significant risk for affected users.
Potential Impact
For European organizations using Onyxia versions 4.6.0 through 4.8.0 with private Helm repositories, this vulnerability poses a severe risk. The leakage of private Helm repository credentials can lead to unauthorized access to proprietary or sensitive software packages, potentially allowing attackers to inject malicious code or disrupt software supply chains. This can compromise the integrity of data science workflows and Kubernetes deployments, leading to operational disruptions and data breaches. Organizations relying on Onyxia for critical data science tasks may face significant downtime and loss of trust if attackers exploit this vulnerability. Furthermore, the exposure of credentials could facilitate lateral movement within the network or provide a foothold for further attacks. Given the increasing adoption of Kubernetes and Helm in European enterprises and research institutions, especially in sectors like finance, healthcare, and government, the impact could be widespread and damaging.
Mitigation Recommendations
European organizations should immediately upgrade Onyxia to version 4.9.0 or later, where the vulnerability is patched. Until the upgrade is performed, organizations should audit their Onyxia deployments to identify any use of private Helm repositories and consider disabling or restricting access to the /public/catalogs endpoint if possible. Implement network-level access controls to limit exposure of the Onyxia API to trusted internal networks only. Additionally, rotate credentials for private Helm repositories that may have been exposed to prevent unauthorized access. Employ monitoring and logging to detect unusual access patterns to Helm repositories and Onyxia APIs. Organizations should also review their Helm repository configurations to ensure credentials are stored and transmitted securely, using secrets management solutions integrated with Kubernetes. Finally, conduct security awareness training for DevOps and platform teams to recognize and remediate such credential exposure risks proactively.
Affected Countries
France, Germany, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-58366: CWE-522: Insufficiently Protected Credentials in InseeFrLab onyxia
Description
Onyxia is a data science environment for kubernetes. In versions 4.6.0 through 4.8.0, Onyxia-API leaked the credentials of private helm repositories in the public (unauthenticated) /public/catalogs endpoint.vOnly instances using private helm repositories (i.e setting username & password in the catalogs configuration) are affected. This is fixed in version 4.9.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-58366 is a critical vulnerability affecting Onyxia, a data science environment designed for Kubernetes, developed by InseeFrLab. The vulnerability exists in versions 4.6.0 through 4.8.0 of Onyxia-API, where the /public/catalogs endpoint, which is unauthenticated and publicly accessible, leaks credentials for private Helm repositories. This occurs when private Helm repositories are configured with usernames and passwords in the catalogs configuration. The exposure of these credentials allows an attacker to gain unauthorized access to private Helm repositories, potentially enabling them to retrieve or manipulate private charts and software packages. The vulnerability is classified under CWE-522 (Insufficiently Protected Credentials), indicating that sensitive credential information is not adequately safeguarded. The CVSS 4.0 score is 9.4 (critical), reflecting the high impact and ease of exploitation: the attack vector is network-based with no user interaction required, and no privileges or authentication are necessary to exploit the flaw. The vulnerability affects the confidentiality and integrity of private Helm repository credentials, and the scope is high because it affects all instances of Onyxia using private Helm repositories within the specified version range. The issue was fixed in version 4.9.0. There are no known exploits in the wild at the time of publication, but the critical severity and public exposure of the endpoint make it a significant risk for affected users.
Potential Impact
For European organizations using Onyxia versions 4.6.0 through 4.8.0 with private Helm repositories, this vulnerability poses a severe risk. The leakage of private Helm repository credentials can lead to unauthorized access to proprietary or sensitive software packages, potentially allowing attackers to inject malicious code or disrupt software supply chains. This can compromise the integrity of data science workflows and Kubernetes deployments, leading to operational disruptions and data breaches. Organizations relying on Onyxia for critical data science tasks may face significant downtime and loss of trust if attackers exploit this vulnerability. Furthermore, the exposure of credentials could facilitate lateral movement within the network or provide a foothold for further attacks. Given the increasing adoption of Kubernetes and Helm in European enterprises and research institutions, especially in sectors like finance, healthcare, and government, the impact could be widespread and damaging.
Mitigation Recommendations
European organizations should immediately upgrade Onyxia to version 4.9.0 or later, where the vulnerability is patched. Until the upgrade is performed, organizations should audit their Onyxia deployments to identify any use of private Helm repositories and consider disabling or restricting access to the /public/catalogs endpoint if possible. Implement network-level access controls to limit exposure of the Onyxia API to trusted internal networks only. Additionally, rotate credentials for private Helm repositories that may have been exposed to prevent unauthorized access. Employ monitoring and logging to detect unusual access patterns to Helm repositories and Onyxia APIs. Organizations should also review their Helm repository configurations to ensure credentials are stored and transmitted securely, using secrets management solutions integrated with Kubernetes. Finally, conduct security awareness training for DevOps and platform teams to recognize and remediate such credential exposure risks proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-29T16:19:59.012Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68bb594d535f4a97730f6c29
Added to database: 9/5/2025, 9:42:37 PM
Last enriched: 9/5/2025, 9:57:36 PM
Last updated: 9/6/2025, 12:16:32 AM
Views: 4
Related Threats
CVE-2025-9853: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in optio Optio Dentistry
MediumCVE-2025-9515: CWE-434 Unrestricted Upload of File with Dangerous Type in mondula2016 Multi Step Form
HighCVE-2025-9085: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wpeverest User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin
MediumCVE-2025-8360: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in choijun LA-Studio Element Kit for Elementor
MediumCVE-2025-8359: CWE-288 Authentication Bypass Using an Alternate Path or Channel in scriptsbundle AdForest
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.