CVE-2025-58445: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in runatlantis atlantis
Atlantis is a self-hosted golang application that listens for Terraform pull request events via webhooks. All versions of Atlantis publicly expose detailed version information through its /status endpoint. This information disclosure could allow attackers to identify and target known vulnerabilities associated with the specific versions, potentially compromising the service's security posture. This issue does not currently have a fix.
AI Analysis
Technical Summary
CVE-2025-58445 is a medium-severity vulnerability affecting Atlantis, a self-hosted Golang application designed to automate Terraform pull request workflows via webhooks. The vulnerability arises because all versions of Atlantis up to and including 0.35.1 expose detailed version information through the publicly accessible /status endpoint. This exposure constitutes an information disclosure vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). By revealing the exact version of Atlantis in use, attackers can identify whether the instance is running a version with known vulnerabilities or weaknesses. Although this vulnerability does not directly allow unauthorized access or code execution, it provides valuable reconnaissance data that can be leveraged in targeted attacks. The CVSS 4.0 base score is 6.9, reflecting a network attack vector with low complexity, no privileges or user interaction required, and limited impact confined to confidentiality (information disclosure). There is currently no fix or patch available for this issue, increasing the risk for organizations using affected versions. The vulnerability does not impact integrity or availability directly but weakens the security posture by facilitating further exploitation through version fingerprinting.
Potential Impact
For European organizations, the exposure of Atlantis version information can increase the risk of targeted attacks against their infrastructure-as-code automation pipelines. Terraform is widely used in cloud infrastructure management, and Atlantis automates Terraform pull request workflows, making it a critical component in DevOps and infrastructure security. Attackers armed with version details can tailor exploits or phishing campaigns to compromise infrastructure provisioning, potentially leading to unauthorized changes, data leakage, or service disruptions. While the vulnerability itself does not allow direct compromise, it lowers the barrier for attackers to identify vulnerable instances and plan subsequent attacks. This is particularly impactful for organizations with sensitive cloud environments or those under regulatory scrutiny for infrastructure security. The lack of a patch means organizations must rely on compensating controls to mitigate risk. Additionally, exposure of version information could aid threat actors in reconnaissance during cyber-espionage or ransomware campaigns targeting European enterprises.
Mitigation Recommendations
Since no official patch is currently available, European organizations should implement the following specific mitigations: 1) Restrict access to the /status endpoint by implementing network-level controls such as IP whitelisting or VPN-only access to limit exposure to internal or trusted users. 2) Use web application firewalls (WAFs) or reverse proxies to filter or block requests to the /status endpoint or to sanitize the response to avoid disclosing version information. 3) Monitor logs and network traffic for unusual access patterns to the /status endpoint to detect reconnaissance attempts. 4) Consider upgrading Atlantis to versions beyond 0.35.1 once a fix is released or engage with the vendor/community to prioritize a patch. 5) Employ infrastructure-as-code security best practices, including strict access controls on Terraform repositories and CI/CD pipelines, to reduce the impact of any potential compromise. 6) Conduct regular security assessments and penetration testing focusing on infrastructure automation components to identify and remediate weaknesses proactively.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland, Denmark
CVE-2025-58445: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in runatlantis atlantis
Description
Atlantis is a self-hosted golang application that listens for Terraform pull request events via webhooks. All versions of Atlantis publicly expose detailed version information through its /status endpoint. This information disclosure could allow attackers to identify and target known vulnerabilities associated with the specific versions, potentially compromising the service's security posture. This issue does not currently have a fix.
AI-Powered Analysis
Technical Analysis
CVE-2025-58445 is a medium-severity vulnerability affecting Atlantis, a self-hosted Golang application designed to automate Terraform pull request workflows via webhooks. The vulnerability arises because all versions of Atlantis up to and including 0.35.1 expose detailed version information through the publicly accessible /status endpoint. This exposure constitutes an information disclosure vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). By revealing the exact version of Atlantis in use, attackers can identify whether the instance is running a version with known vulnerabilities or weaknesses. Although this vulnerability does not directly allow unauthorized access or code execution, it provides valuable reconnaissance data that can be leveraged in targeted attacks. The CVSS 4.0 base score is 6.9, reflecting a network attack vector with low complexity, no privileges or user interaction required, and limited impact confined to confidentiality (information disclosure). There is currently no fix or patch available for this issue, increasing the risk for organizations using affected versions. The vulnerability does not impact integrity or availability directly but weakens the security posture by facilitating further exploitation through version fingerprinting.
Potential Impact
For European organizations, the exposure of Atlantis version information can increase the risk of targeted attacks against their infrastructure-as-code automation pipelines. Terraform is widely used in cloud infrastructure management, and Atlantis automates Terraform pull request workflows, making it a critical component in DevOps and infrastructure security. Attackers armed with version details can tailor exploits or phishing campaigns to compromise infrastructure provisioning, potentially leading to unauthorized changes, data leakage, or service disruptions. While the vulnerability itself does not allow direct compromise, it lowers the barrier for attackers to identify vulnerable instances and plan subsequent attacks. This is particularly impactful for organizations with sensitive cloud environments or those under regulatory scrutiny for infrastructure security. The lack of a patch means organizations must rely on compensating controls to mitigate risk. Additionally, exposure of version information could aid threat actors in reconnaissance during cyber-espionage or ransomware campaigns targeting European enterprises.
Mitigation Recommendations
Since no official patch is currently available, European organizations should implement the following specific mitigations: 1) Restrict access to the /status endpoint by implementing network-level controls such as IP whitelisting or VPN-only access to limit exposure to internal or trusted users. 2) Use web application firewalls (WAFs) or reverse proxies to filter or block requests to the /status endpoint or to sanitize the response to avoid disclosing version information. 3) Monitor logs and network traffic for unusual access patterns to the /status endpoint to detect reconnaissance attempts. 4) Consider upgrading Atlantis to versions beyond 0.35.1 once a fix is released or engage with the vendor/community to prioritize a patch. 5) Employ infrastructure-as-code security best practices, including strict access controls on Terraform repositories and CI/CD pipelines, to reduce the impact of any potential compromise. 6) Conduct regular security assessments and penetration testing focusing on infrastructure automation components to identify and remediate weaknesses proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-01T20:03:06.533Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68bccd0da2c363fb16078f96
Added to database: 9/7/2025, 12:08:45 AM
Last enriched: 9/7/2025, 12:09:23 AM
Last updated: 9/8/2025, 6:22:44 AM
Views: 5
Related Threats
CVE-2025-3212: CWE-416 Use After Free in Arm Ltd Bifrost GPU Kernel Driver
UnknownCVE-2025-10093: Information Disclosure in D-Link DIR-852
MediumCVE-2025-10092: XML External Entity Reference in Jinher OA
MediumCVE-2025-40642: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in WebWork WebWork PHP script
MediumCVE-2025-10091: XML External Entity Reference in Jinher OA
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.