CVE-2025-64179: CWE-862: Missing Authorization in treeverse lakeFS
lakeFS is an open-source tool that transforms object storage into a Git-like repositories. In versions 1.69.0 and below, missing authentication in the /api/v1/usage-report/summary endpoint allows anyone to retrieve aggregate API usage counts. While no sensitive data is disclosed, the endpoint may reveal information about service activity or uptime. This issue is fixed in version 1.71.0 . To workaround the vulnerability, use a load-balancer or application level firewall in order to block the request route /api/v1/usage-report/summary.
AI Analysis
Technical Summary
CVE-2025-64179 is a vulnerability identified in the open-source project lakeFS, maintained by treeverse, which provides Git-like version control capabilities for object storage systems. The issue exists in versions 1.69.0 and earlier, where the /api/v1/usage-report/summary REST API endpoint lacks proper authorization controls. This missing authorization (CWE-862) allows any unauthenticated user to query this endpoint and retrieve aggregate API usage counts. Although the data exposed does not include sensitive or personal information, it reveals operational metadata such as service activity levels and uptime patterns. Such information could be leveraged by attackers during reconnaissance to infer system usage trends or identify optimal times for attacks. The vulnerability does not affect data integrity or availability and does not require any user interaction, making it remotely exploitable with low complexity. The issue was publicly disclosed and assigned CVE-2025-64179 with a CVSS v3.1 base score of 5.3 (medium severity), reflecting limited confidentiality impact but no integrity or availability impact. The vendor fixed the vulnerability in lakeFS version 1.71.0. Until upgrading, organizations can mitigate exposure by configuring network controls such as load balancers or application-level firewalls to block access to the vulnerable endpoint path. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, the primary impact of this vulnerability is the unintended disclosure of aggregate API usage metrics, which may reveal operational patterns of their lakeFS deployments. While no sensitive data or user-specific information is exposed, attackers could use this metadata to better understand system behavior, potentially aiding in timing or targeting of subsequent attacks. Organizations relying on lakeFS for managing object storage repositories in data engineering, analytics, or cloud-native environments may face increased reconnaissance risk. Although the direct impact on confidentiality is limited, the information leakage could indirectly facilitate more sophisticated attacks. There is no impact on data integrity or service availability, so business operations should remain unaffected. However, organizations with strict compliance or security policies around information disclosure should consider this vulnerability significant enough to warrant prompt remediation. The risk is higher for entities with public-facing lakeFS instances or those lacking network-level access controls.
Mitigation Recommendations
1. Upgrade lakeFS to version 1.71.0 or later, where the authorization check on the /api/v1/usage-report/summary endpoint is properly enforced. 2. If immediate upgrade is not feasible, implement network-level controls such as load balancers or application firewalls to block or restrict access to the /api/v1/usage-report/summary endpoint, ensuring only authorized internal systems can reach it. 3. Review and tighten API gateway and reverse proxy configurations to enforce authentication and authorization policies on all API endpoints. 4. Monitor access logs for unusual or unauthorized requests targeting the usage-report endpoint to detect potential reconnaissance attempts. 5. Incorporate this vulnerability into vulnerability management and patching workflows to ensure timely updates. 6. Educate DevOps and security teams about the importance of securing telemetry and usage reporting endpoints, which may inadvertently leak operational data.
Affected Countries
Germany, United Kingdom, Netherlands, France, Sweden
CVE-2025-64179: CWE-862: Missing Authorization in treeverse lakeFS
Description
lakeFS is an open-source tool that transforms object storage into a Git-like repositories. In versions 1.69.0 and below, missing authentication in the /api/v1/usage-report/summary endpoint allows anyone to retrieve aggregate API usage counts. While no sensitive data is disclosed, the endpoint may reveal information about service activity or uptime. This issue is fixed in version 1.71.0 . To workaround the vulnerability, use a load-balancer or application level firewall in order to block the request route /api/v1/usage-report/summary.
AI-Powered Analysis
Technical Analysis
CVE-2025-64179 is a vulnerability identified in the open-source project lakeFS, maintained by treeverse, which provides Git-like version control capabilities for object storage systems. The issue exists in versions 1.69.0 and earlier, where the /api/v1/usage-report/summary REST API endpoint lacks proper authorization controls. This missing authorization (CWE-862) allows any unauthenticated user to query this endpoint and retrieve aggregate API usage counts. Although the data exposed does not include sensitive or personal information, it reveals operational metadata such as service activity levels and uptime patterns. Such information could be leveraged by attackers during reconnaissance to infer system usage trends or identify optimal times for attacks. The vulnerability does not affect data integrity or availability and does not require any user interaction, making it remotely exploitable with low complexity. The issue was publicly disclosed and assigned CVE-2025-64179 with a CVSS v3.1 base score of 5.3 (medium severity), reflecting limited confidentiality impact but no integrity or availability impact. The vendor fixed the vulnerability in lakeFS version 1.71.0. Until upgrading, organizations can mitigate exposure by configuring network controls such as load balancers or application-level firewalls to block access to the vulnerable endpoint path. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, the primary impact of this vulnerability is the unintended disclosure of aggregate API usage metrics, which may reveal operational patterns of their lakeFS deployments. While no sensitive data or user-specific information is exposed, attackers could use this metadata to better understand system behavior, potentially aiding in timing or targeting of subsequent attacks. Organizations relying on lakeFS for managing object storage repositories in data engineering, analytics, or cloud-native environments may face increased reconnaissance risk. Although the direct impact on confidentiality is limited, the information leakage could indirectly facilitate more sophisticated attacks. There is no impact on data integrity or service availability, so business operations should remain unaffected. However, organizations with strict compliance or security policies around information disclosure should consider this vulnerability significant enough to warrant prompt remediation. The risk is higher for entities with public-facing lakeFS instances or those lacking network-level access controls.
Mitigation Recommendations
1. Upgrade lakeFS to version 1.71.0 or later, where the authorization check on the /api/v1/usage-report/summary endpoint is properly enforced. 2. If immediate upgrade is not feasible, implement network-level controls such as load balancers or application firewalls to block or restrict access to the /api/v1/usage-report/summary endpoint, ensuring only authorized internal systems can reach it. 3. Review and tighten API gateway and reverse proxy configurations to enforce authentication and authorization policies on all API endpoints. 4. Monitor access logs for unusual or unauthorized requests targeting the usage-report endpoint to detect potential reconnaissance attempts. 5. Incorporate this vulnerability into vulnerability management and patching workflows to ensure timely updates. 6. Educate DevOps and security teams about the importance of securing telemetry and usage reporting endpoints, which may inadvertently leak operational data.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-28T21:07:16.440Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690d1bd3a155e591f5870723
Added to database: 11/6/2025, 10:06:11 PM
Last enriched: 11/6/2025, 10:21:19 PM
Last updated: 11/7/2025, 3:52:14 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64323: CWE-862: Missing Authorization in kgateway-dev kgateway
MediumCVE-2025-64184: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in webcomics dosage
HighCVE-2025-64180: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition in Manager-io Manager
CriticalCVE-2025-11546: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in NEC Corporation CLUSTERPRO X for Linux (EXPRESSCLUSTER X for Linux)
CriticalCVE-2024-9683: Authentication Bypass by Primary Weakness
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.