CVE-2025-66029: CWE-522: Insufficiently Protected Credentials in OSC ondemand
Open OnDemand provides remote web access to supercomputers. In versions 4.0.8 and prior, the Apache proxy allows sensitive headers to be passed to origin servers. This means malicious users can create an origin server on a compute node that record these headers when unsuspecting users connect to it. Maintainers anticipate a patch in a 4.1 release. Workarounds exist for 4.0.x versions. Using `custom_location_directives` in `ood_portal.yml` in version 4.0.x (not available for versions below 4.0) centers can unset and or edit these headers. Note that `OIDCPassClaimsAs both` is the default and centers can set `OIDCPassClaimsAs ` to `none` or `environment` to stop passing these headers to the client. Centers that have an OIDC provider with the `OIDCPassClaimsAs` with `none` or `environment` settings can adjust the settings using guidance provided in GHSA-2cwp-8g29-9q32 to unset the mod_auth_openidc_session cookies.
AI Analysis
Technical Summary
Open OnDemand is a web-based platform that provides remote access to supercomputers, widely used in HPC environments. Versions 4.0.8 and earlier contain a vulnerability (CVE-2025-66029) where the Apache proxy component forwards sensitive HTTP headers to origin servers without sufficient protection. This behavior allows a malicious user with some level of access to deploy a rogue origin server on a compute node, which can then capture these sensitive headers when legitimate users connect. The headers may contain authentication tokens or session cookies, leading to credential exposure (CWE-522) and insufficient credential protection (CWE-523). The default configuration uses `OIDCPassClaimsAs both`, which passes claims both as headers and environment variables, increasing risk. Administrators can mitigate exposure by modifying `ood_portal.yml` using `custom_location_directives` to unset or edit headers, and by setting `OIDCPassClaimsAs` to `none` or `environment` to reduce header transmission. These mitigations are available for 4.0.x versions but not earlier. A patch is anticipated in the 4.1 release to address this issue fully. The CVSS 3.1 score of 7.6 reflects a network attack vector with low complexity, requiring privileges and user interaction, with high confidentiality impact, limited integrity impact, and no availability impact. No known exploits are currently in the wild, but the vulnerability poses a significant risk to HPC environments relying on Open OnDemand for remote access.
Potential Impact
For European organizations, particularly those operating supercomputing centers and HPC clusters, this vulnerability poses a substantial risk to the confidentiality of user credentials and session tokens. Exposure of these credentials could allow attackers to impersonate legitimate users, gain unauthorized access to sensitive computational resources, and potentially exfiltrate or manipulate sensitive scientific or industrial data. Given the critical role of HPC in research, energy, finance, and defense sectors across Europe, such breaches could disrupt operations and compromise intellectual property. Although the vulnerability does not directly affect system integrity or availability, the loss of confidentiality alone can have severe operational and reputational consequences. The requirement for some privileges and user interaction limits exploitation to insiders or targeted attacks, but the impact remains high due to the sensitivity of the affected environments.
Mitigation Recommendations
European HPC centers should immediately review their Open OnDemand configurations, especially if running version 4.0.8 or earlier. Administrators should implement the workaround by editing `ood_portal.yml` to include `custom_location_directives` that unset or modify sensitive headers before they reach origin servers. Changing the `OIDCPassClaimsAs` setting from the default `both` to `none` or `environment` reduces the risk of header leakage. Centers using OIDC providers should follow guidance from GHSA-2cwp-8g29-9q32 to unset `mod_auth_openidc_session` cookies appropriately. Monitoring internal network traffic for unauthorized origin servers on compute nodes can help detect attempts to exploit this vulnerability. Planning and testing the upgrade to Open OnDemand 4.1, once released, is critical for a permanent fix. Additionally, implementing strict access controls and auditing user activities on compute nodes can reduce the risk of malicious origin server deployment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Switzerland, Italy, Spain, Sweden, Finland, Poland
CVE-2025-66029: CWE-522: Insufficiently Protected Credentials in OSC ondemand
Description
Open OnDemand provides remote web access to supercomputers. In versions 4.0.8 and prior, the Apache proxy allows sensitive headers to be passed to origin servers. This means malicious users can create an origin server on a compute node that record these headers when unsuspecting users connect to it. Maintainers anticipate a patch in a 4.1 release. Workarounds exist for 4.0.x versions. Using `custom_location_directives` in `ood_portal.yml` in version 4.0.x (not available for versions below 4.0) centers can unset and or edit these headers. Note that `OIDCPassClaimsAs both` is the default and centers can set `OIDCPassClaimsAs ` to `none` or `environment` to stop passing these headers to the client. Centers that have an OIDC provider with the `OIDCPassClaimsAs` with `none` or `environment` settings can adjust the settings using guidance provided in GHSA-2cwp-8g29-9q32 to unset the mod_auth_openidc_session cookies.
AI-Powered Analysis
Technical Analysis
Open OnDemand is a web-based platform that provides remote access to supercomputers, widely used in HPC environments. Versions 4.0.8 and earlier contain a vulnerability (CVE-2025-66029) where the Apache proxy component forwards sensitive HTTP headers to origin servers without sufficient protection. This behavior allows a malicious user with some level of access to deploy a rogue origin server on a compute node, which can then capture these sensitive headers when legitimate users connect. The headers may contain authentication tokens or session cookies, leading to credential exposure (CWE-522) and insufficient credential protection (CWE-523). The default configuration uses `OIDCPassClaimsAs both`, which passes claims both as headers and environment variables, increasing risk. Administrators can mitigate exposure by modifying `ood_portal.yml` using `custom_location_directives` to unset or edit headers, and by setting `OIDCPassClaimsAs` to `none` or `environment` to reduce header transmission. These mitigations are available for 4.0.x versions but not earlier. A patch is anticipated in the 4.1 release to address this issue fully. The CVSS 3.1 score of 7.6 reflects a network attack vector with low complexity, requiring privileges and user interaction, with high confidentiality impact, limited integrity impact, and no availability impact. No known exploits are currently in the wild, but the vulnerability poses a significant risk to HPC environments relying on Open OnDemand for remote access.
Potential Impact
For European organizations, particularly those operating supercomputing centers and HPC clusters, this vulnerability poses a substantial risk to the confidentiality of user credentials and session tokens. Exposure of these credentials could allow attackers to impersonate legitimate users, gain unauthorized access to sensitive computational resources, and potentially exfiltrate or manipulate sensitive scientific or industrial data. Given the critical role of HPC in research, energy, finance, and defense sectors across Europe, such breaches could disrupt operations and compromise intellectual property. Although the vulnerability does not directly affect system integrity or availability, the loss of confidentiality alone can have severe operational and reputational consequences. The requirement for some privileges and user interaction limits exploitation to insiders or targeted attacks, but the impact remains high due to the sensitivity of the affected environments.
Mitigation Recommendations
European HPC centers should immediately review their Open OnDemand configurations, especially if running version 4.0.8 or earlier. Administrators should implement the workaround by editing `ood_portal.yml` to include `custom_location_directives` that unset or modify sensitive headers before they reach origin servers. Changing the `OIDCPassClaimsAs` setting from the default `both` to `none` or `environment` reduces the risk of header leakage. Centers using OIDC providers should follow guidance from GHSA-2cwp-8g29-9q32 to unset `mod_auth_openidc_session` cookies appropriately. Monitoring internal network traffic for unauthorized origin servers on compute nodes can help detect attempts to exploit this vulnerability. Planning and testing the upgrade to Open OnDemand 4.1, once released, is critical for a permanent fix. Additionally, implementing strict access controls and auditing user activities on compute nodes can reduce the risk of malicious origin server deployment.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-21T01:08:02.614Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6943327a058703ef3fcb5ca5
Added to database: 12/17/2025, 10:45:14 PM
Last enriched: 12/25/2025, 12:10:15 AM
Last updated: 2/6/2026, 2:49:43 AM
Views: 1096
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1974: Denial of Service in Free5GC
MediumCVE-2026-1973: NULL Pointer Dereference in Free5GC
MediumCVE-2026-1972: Use of Default Credentials in Edimax BR-6208AC
MediumCVE-2026-1971: Cross Site Scripting in Edimax BR-6288ACL
MediumCVE-2026-23623: CWE-285: Improper Authorization in CollaboraOnline online
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.