Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-mhjq-8c7m-3f7p | Milvus Proxy has a Critical Authentication Bypass Vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 12 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 12 Nov 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Milvus
Milvus milvus |
|
| Vendors & Products |
Milvus
Milvus milvus |
Mon, 10 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Milvus is an open-source vector database built for generative AI applications. An unauthenticated attacker can exploit a vulnerability in versions prior to 2.4.24, 2.5.21, and 2.6.5 to bypass all authentication mechanisms in the Milvus Proxy component, gaining full administrative access to the Milvus cluster. This grants the attacker the ability to read, modify, or delete data, and to perform privileged administrative operations such as database or collection management. This issue has been fixed in Milvus 2.4.24, 2.5.21, and 2.6.5. If immediate upgrade is not possible, a temporary mitigation can be applied by removing the sourceID header from all incoming requests at the gateway, API gateway, or load balancer level before they reach the Milvus Proxy. This prevents attackers from exploiting the authentication bypass behavior. | |
| Title | Milvus Proxy has Critical Authentication Bypass Vulnerability | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-12T20:13:31.847Z
Reserved: 2025-11-05T21:15:39.400Z
Link: CVE-2025-64513
Updated: 2025-11-12T17:34:55.561Z
Status : Awaiting Analysis
Published: 2025-11-10T22:15:40.270
Modified: 2025-11-12T16:19:59.103
Link: CVE-2025-64513
No data.
OpenCVE Enrichment
Updated: 2025-11-12T12:48:13Z
Github GHSA