Cryostat HTTP API binds to all interfaces, enabling external access
CVE-2025-8415 Published on August 20, 2025
Cryostat: authentication bypass if network policies are disabled
A vulnerability was found in the Cryostat HTTP API. Cryostat's HTTP API binds to all network interfaces, allowing possible external visibility and access to the API port if Network Policies are disabled, allowing an unauthenticated, malicious attacker to jeopardize the environment.
Vulnerability Analysis
CVE-2025-8415 can be exploited with network access, and requires user privileges. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality and integrity, and no impact on availability.
Timeline
Reported to Red Hat.
Made public. 20 days later.
Weakness Type
Authentication Bypass by Alternate Name
The software performs authentication based on the name of a resource being accessed, or the name of the actor performing the access, but it does not properly check all possible names for that resource or actor.
Products Associated with CVE-2025-8415
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2025-8415 are published in Red Hat Cryostat:
Affected Versions
Cryostat:- Before 4.0.2 is affected.
- Version 0.5.2-3 and below * is unaffected.
- Version 4.0.2-3 and below * is unaffected.
- Version 4.0.2-3 and below * is unaffected.
- Version 4.0.2-3 and below * is unaffected.
- Version 4.0.2-3 and below * is unaffected.
- Version 4.0.2-3 and below * is unaffected.
- Version 4.0.2-3 and below * is unaffected.
- Version 4.0.2-3 and below * is unaffected.
- Version 4.0.2-3 and below * is unaffected.
- Version 4.0.2-3 and below * is unaffected.
- Version 4.0.2-3 and below * is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.