Authentication Bypass Vulnerability in Karapace by Aiven
CVE-2025-61673

8.6HIGH

Key Information:

Vendor

Aiven-open

Status
Vendor
CVE Published:
3 October 2025

What is CVE-2025-61673?

Karapace, an open-source implementation of Kafka REST and Schema Registry, has a notable security vulnerability in versions 5.0.0 and 5.0.1. When using OAuth 2.0 Bearer Token authentication, a significant flaw allows unauthenticated users to bypass token validation entirely if requests are made without an Authorization header. This oversight means that unauthorized individuals can access and manipulate Schema Registry endpoints that should be securely protected, thus undermining the intended security of the OAuth authentication scheme. The issue is remedied in version 5.0.2.

Affected Version(s)

karapace >= 5.0.0, < 5.0.2

References

CVSS V3.1

Score:
8.6
Severity:
HIGH
Confidentiality:
Low
Integrity:
High
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-61673 : Authentication Bypass Vulnerability in Karapace by Aiven