CVE-2025-68671: CWE-294: Authentication Bypass by Capture-replay in treeverse lakeFS
lakeFS is an open-source tool that transforms object storage into a Git-like repositories. LakeFS's S3 gateway does not validate timestamps in authenticated requests, allowing replay attacks. Prior to 1.75.0, an attacker who captures a valid signed request (e.g., through network interception, logs, or compromised systems) can replay that request until credentials are rotated, even after the request is intended to expire. This vulnerability is fixed in 1.75.0.
AI Analysis
Technical Summary
The vulnerability CVE-2025-68671 affects treeverse's lakeFS, an open-source tool that provides Git-like version control for object storage systems. Specifically, the lakeFS S3 gateway fails to validate the timestamps embedded in authenticated requests. Signed requests typically include timestamps to prevent replay attacks by ensuring requests are only valid for a limited time. However, in affected versions prior to 1.75.0, this timestamp validation is absent or insufficient, allowing an attacker who captures a legitimate signed request—via network interception, compromised logs, or other means—to replay the request repeatedly. This replay bypasses authentication controls because the system accepts the reused request as valid, even after the original expiration time. The attacker does not need any privileges or user interaction to exploit this vulnerability, and the scope includes any lakeFS deployment using the vulnerable S3 gateway. The impact includes unauthorized access or modification of object storage data, undermining confidentiality and integrity. The vulnerability is classified under CWE-294 (Authentication Bypass by Capture-replay). The issue is resolved in lakeFS version 1.75.0, which implements proper timestamp validation to prevent replay attacks. No known exploits are currently reported in the wild, but the medium CVSS score (6.5) reflects the moderate risk due to ease of exploitation and potential data exposure.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on lakeFS to manage critical object storage repositories. Replay attacks can lead to unauthorized data access or modification, compromising data confidentiality and integrity. This risk is heightened in sectors handling sensitive or regulated data, such as finance, healthcare, and government. Unauthorized replayed requests could allow attackers to retrieve or alter stored objects, potentially leading to data breaches or disruption of data workflows. Since the vulnerability does not affect availability directly, denial-of-service impacts are minimal. However, the trustworthiness of version-controlled object storage is critical for compliance and operational integrity, so exploitation could have regulatory and reputational consequences. Organizations with automated pipelines or CI/CD processes integrating lakeFS could see cascading effects if malicious replayed requests alter stored artifacts or configurations.
Mitigation Recommendations
The primary mitigation is to upgrade all lakeFS deployments to version 1.75.0 or later, where the timestamp validation flaw is fixed. Organizations should implement strict credential rotation policies to limit the window of exposure for captured signed requests. Network security controls such as encryption (TLS) and network segmentation can reduce the risk of request capture. Monitoring and logging of repeated identical requests may help detect replay attempts. Additionally, organizations should review their object storage access patterns and consider implementing additional layers of authentication or request validation where feasible. Employing anomaly detection tools that flag unusual request patterns to the S3 gateway can provide early warning. Finally, educating developers and administrators about the risks of replay attacks and secure handling of signed requests is recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium
CVE-2025-68671: CWE-294: Authentication Bypass by Capture-replay in treeverse lakeFS
Description
lakeFS is an open-source tool that transforms object storage into a Git-like repositories. LakeFS's S3 gateway does not validate timestamps in authenticated requests, allowing replay attacks. Prior to 1.75.0, an attacker who captures a valid signed request (e.g., through network interception, logs, or compromised systems) can replay that request until credentials are rotated, even after the request is intended to expire. This vulnerability is fixed in 1.75.0.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2025-68671 affects treeverse's lakeFS, an open-source tool that provides Git-like version control for object storage systems. Specifically, the lakeFS S3 gateway fails to validate the timestamps embedded in authenticated requests. Signed requests typically include timestamps to prevent replay attacks by ensuring requests are only valid for a limited time. However, in affected versions prior to 1.75.0, this timestamp validation is absent or insufficient, allowing an attacker who captures a legitimate signed request—via network interception, compromised logs, or other means—to replay the request repeatedly. This replay bypasses authentication controls because the system accepts the reused request as valid, even after the original expiration time. The attacker does not need any privileges or user interaction to exploit this vulnerability, and the scope includes any lakeFS deployment using the vulnerable S3 gateway. The impact includes unauthorized access or modification of object storage data, undermining confidentiality and integrity. The vulnerability is classified under CWE-294 (Authentication Bypass by Capture-replay). The issue is resolved in lakeFS version 1.75.0, which implements proper timestamp validation to prevent replay attacks. No known exploits are currently reported in the wild, but the medium CVSS score (6.5) reflects the moderate risk due to ease of exploitation and potential data exposure.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on lakeFS to manage critical object storage repositories. Replay attacks can lead to unauthorized data access or modification, compromising data confidentiality and integrity. This risk is heightened in sectors handling sensitive or regulated data, such as finance, healthcare, and government. Unauthorized replayed requests could allow attackers to retrieve or alter stored objects, potentially leading to data breaches or disruption of data workflows. Since the vulnerability does not affect availability directly, denial-of-service impacts are minimal. However, the trustworthiness of version-controlled object storage is critical for compliance and operational integrity, so exploitation could have regulatory and reputational consequences. Organizations with automated pipelines or CI/CD processes integrating lakeFS could see cascading effects if malicious replayed requests alter stored artifacts or configurations.
Mitigation Recommendations
The primary mitigation is to upgrade all lakeFS deployments to version 1.75.0 or later, where the timestamp validation flaw is fixed. Organizations should implement strict credential rotation policies to limit the window of exposure for captured signed requests. Network security controls such as encryption (TLS) and network segmentation can reduce the risk of request capture. Monitoring and logging of repeated identical requests may help detect replay attempts. Additionally, organizations should review their object storage access patterns and consider implementing additional layers of authentication or request validation where feasible. Employing anomaly detection tools that flag unusual request patterns to the S3 gateway can provide early warning. Finally, educating developers and administrators about the risks of replay attacks and secure handling of signed requests is recommended.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-22T23:37:00.931Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6969710d7c726673b6836a48
Added to database: 1/15/2026, 10:58:21 PM
Last enriched: 1/23/2026, 7:49:17 PM
Last updated: 2/7/2026, 3:53:02 PM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.