Authentication Bypass Vulnerability in Milvus Vector Database
CVE-2025-64513

9.3CRITICAL

Key Information:

Vendor

Milvus-io

Status
Vendor
CVE Published:
10 November 2025

What is CVE-2025-64513?

Milvus is an open-source vector database designed for generative AI applications. A significant vulnerability in the Milvus Proxy allows unauthenticated attackers to bypass all authentication mechanisms in specific versions prior to 2.4.24, 2.5.21, and 2.6.5. This flaw grants attackers full administrative access to the Milvus cluster, enabling them to read, modify, or delete critical data as well as execute privileged operations such as database and collection management. To mitigate this vulnerability temporarily, it is recommended to remove the sourceID header from all incoming requests at the gateway, API gateway, or load balancer before they reach the Milvus Proxy. For a permanent solution, upgrading to the patched versions is essential. For more details, refer to the official security advisories.

Affected Version(s)

milvus < 2.4.24 < 2.4.24

milvus >= 2.5.0, < 2.5.21 < 2.5.0, 2.5.21

milvus >= 2.6.0, < 2.6.5 < 2.6.0, 2.6.5

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-64513 : Authentication Bypass Vulnerability in Milvus Vector Database