{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T18:02:50.130","vulnerabilities":[{"cve":{"id":"CVE-2025-25207","sourceIdentifier":"secalert@redhat.com","published":"2025-06-09T06:15:24.413","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The Authorino service in the Red Hat Connectivity Link is the authorization service for zero trust API security. Authorino allows the users with developer persona to add callbacks to be executed to HTTP endpoints once the authorization process is completed. It was found that an attacker with developer persona access can add a large number of those callbacks to be executed by Authorino and as the authentication policy is enforced by a single instance of the service, this leada to a Denial of Service in Authorino while processing the post-authorization callbacks."},{"lang":"es","value":"El servicio Authorino en Red Hat Connectivity Link es el servicio de autorización para la seguridad de API de confianza cero. Authorino permite a los usuarios con perfil de desarrollador agregar devoluciones de llamadas para que se ejecuten en los endpoints HTTP una vez completado el proceso de autorización. Se descubrió que un atacante con acceso de perfil de desarrollador puede agregar un gran número de estas devoluciones de llamadas para que las ejecute Authorino. Dado que la política de autenticación se aplica mediante una sola instancia del servicio, esto provoca una denegación de servicio en Authorino al procesar las devoluciones de llamadas posteriores a la autorización."}],"metrics":{"cvssMetricV31":[{"source":"secalert@redhat.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.7,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":3.6}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Primary","description":[{"lang":"en","value":"CWE-770"}]}],"references":[{"url":"https://access.redhat.com/security/cve/CVE-2025-25207","source":"secalert@redhat.com"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2347421","source":"secalert@redhat.com"}]}}]}