CVE-2025-64323: CWE-862: Missing Authorization in kgateway-dev kgateway
kgateway is a Cloud-Native API and AI Gateway. Versions 2.0.4 and below and 2.1.0-agw-cel-rbac through 2.1.0-rc.2 lack authentication, allowing any client with unrestricted network access to the xDS port to retrieve potentially sensitive configuration data including certificate data, backend service information, routing rules, and cluster metadata. This issue is solved in versions 2.0.5 and 2.1.0.
AI Analysis
Technical Summary
CVE-2025-64323 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the kgateway product, a cloud-native API and AI gateway solution. Versions 2.0.4 and earlier, as well as versions from 2.1.0-agw-cel-rbac up to but not including 2.1.0, lack proper authentication controls on the xDS port. The xDS port is used for dynamic configuration delivery in service mesh and gateway environments. Due to missing authorization, any client with network access to this port can query and retrieve sensitive configuration data without authentication. This data includes certificate material, backend service information, routing rules, and cluster metadata, which could facilitate further attacks such as man-in-the-middle, service impersonation, or reconnaissance for lateral movement. The vulnerability has a CVSS 3.1 base score of 5.3 (medium severity), reflecting high confidentiality impact but no impact on integrity or availability. Exploitation requires network access but no privileges or user interaction. The vulnerability was publicly disclosed on November 7, 2025, and fixed in versions 2.0.5 and 2.1.0. No known exploits are reported in the wild as of the publication date. Given the nature of kgateway as a cloud-native API gateway, this vulnerability poses a risk to organizations relying on it for secure API management and AI service orchestration.
Potential Impact
For European organizations, the exposure of sensitive configuration data can lead to significant confidentiality breaches. Attackers gaining access to certificate data could impersonate services or decrypt communications, undermining trust and security of internal and external APIs. Disclosure of backend service information and routing rules can facilitate targeted attacks, lateral movement, or service disruption attempts. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, face increased regulatory and reputational risks. The vulnerability could also impact cloud service providers and managed service operators using kgateway, potentially affecting multiple downstream customers. Although the vulnerability does not directly affect system integrity or availability, the indirect consequences of data exposure could lead to more severe attacks. The requirement for network access to the xDS port means that organizations with poorly segmented networks or exposed management interfaces are at higher risk.
Mitigation Recommendations
Organizations should immediately upgrade kgateway to versions 2.0.5 or 2.1.0 or later to remediate the missing authorization issue. Until patching is complete, restrict network access to the xDS port using firewall rules, network segmentation, or zero-trust network controls to limit exposure to trusted management hosts only. Conduct audits of existing network configurations to ensure that the xDS port is not exposed to untrusted networks or the internet. Implement strict access controls and monitoring on API gateway management interfaces to detect unauthorized access attempts. Review and rotate any certificates or credentials that may have been exposed due to this vulnerability. Incorporate this vulnerability into incident response plans and threat hunting activities to identify potential exploitation. Finally, ensure that future deployments of kgateway or similar gateways enforce authentication and authorization by default on all management and configuration interfaces.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-64323: CWE-862: Missing Authorization in kgateway-dev kgateway
Description
kgateway is a Cloud-Native API and AI Gateway. Versions 2.0.4 and below and 2.1.0-agw-cel-rbac through 2.1.0-rc.2 lack authentication, allowing any client with unrestricted network access to the xDS port to retrieve potentially sensitive configuration data including certificate data, backend service information, routing rules, and cluster metadata. This issue is solved in versions 2.0.5 and 2.1.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-64323 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the kgateway product, a cloud-native API and AI gateway solution. Versions 2.0.4 and earlier, as well as versions from 2.1.0-agw-cel-rbac up to but not including 2.1.0, lack proper authentication controls on the xDS port. The xDS port is used for dynamic configuration delivery in service mesh and gateway environments. Due to missing authorization, any client with network access to this port can query and retrieve sensitive configuration data without authentication. This data includes certificate material, backend service information, routing rules, and cluster metadata, which could facilitate further attacks such as man-in-the-middle, service impersonation, or reconnaissance for lateral movement. The vulnerability has a CVSS 3.1 base score of 5.3 (medium severity), reflecting high confidentiality impact but no impact on integrity or availability. Exploitation requires network access but no privileges or user interaction. The vulnerability was publicly disclosed on November 7, 2025, and fixed in versions 2.0.5 and 2.1.0. No known exploits are reported in the wild as of the publication date. Given the nature of kgateway as a cloud-native API gateway, this vulnerability poses a risk to organizations relying on it for secure API management and AI service orchestration.
Potential Impact
For European organizations, the exposure of sensitive configuration data can lead to significant confidentiality breaches. Attackers gaining access to certificate data could impersonate services or decrypt communications, undermining trust and security of internal and external APIs. Disclosure of backend service information and routing rules can facilitate targeted attacks, lateral movement, or service disruption attempts. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, face increased regulatory and reputational risks. The vulnerability could also impact cloud service providers and managed service operators using kgateway, potentially affecting multiple downstream customers. Although the vulnerability does not directly affect system integrity or availability, the indirect consequences of data exposure could lead to more severe attacks. The requirement for network access to the xDS port means that organizations with poorly segmented networks or exposed management interfaces are at higher risk.
Mitigation Recommendations
Organizations should immediately upgrade kgateway to versions 2.0.5 or 2.1.0 or later to remediate the missing authorization issue. Until patching is complete, restrict network access to the xDS port using firewall rules, network segmentation, or zero-trust network controls to limit exposure to trusted management hosts only. Conduct audits of existing network configurations to ensure that the xDS port is not exposed to untrusted networks or the internet. Implement strict access controls and monitoring on API gateway management interfaces to detect unauthorized access attempts. Review and rotate any certificates or credentials that may have been exposed due to this vulnerability. Incorporate this vulnerability into incident response plans and threat hunting activities to identify potential exploitation. Finally, ensure that future deployments of kgateway or similar gateways enforce authentication and authorization by default on all management and configuration interfaces.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-30T17:40:52.027Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690d65e75b03e68548857302
Added to database: 11/7/2025, 3:22:15 AM
Last enriched: 11/14/2025, 4:49:49 AM
Last updated: 12/22/2025, 10:56:07 AM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61739: CWE-323 Reusing a Nonce, Key pair in encryption in Johnson Controls IQ Panels2, 2+, IQHub, IQPanel 4, PowerG
HighCVE-2025-61738: CWE-319 Cleartext Transmission of Sensitive Information in Johnson Controls IQPanel2, IQHub,IQPanel2+,IQPanel 4,PowerG
LowCVE-2025-62880: CWE-352 Cross-Site Request Forgery (CSRF) in Kunal Nagar Custom 404 Pro
MediumCVE-2025-62107: CWE-352 Cross-Site Request Forgery (CSRF) in PluginOps Feather Login Page
MediumCVE-2025-62094: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Voidthemes Void Elementor WHMCS Elements For Elementor Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.