// For flags

CVE-2025-6920

Ai-inference-server: authentication bypass via unprotected inference endpoint in api

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

A flaw was found in the authentication enforcement mechanism of a model inference API in ai-inference-server. All /v1/* endpoints are expected to enforce API key validation. However, the POST /invocations endpoint failed to do so, resulting in an authentication bypass. This vulnerability allows unauthorized users to access the same inference features available on protected endpoints, potentially exposing sensitive functionality or allowing unintended access to backend resources.

Se detectó una falla en el mecanismo de aplicación de la autenticación de una API de inferencia de modelos en ai-inference-server. Se espera que todos los endpoints /v1/* apliquen la validación de la clave API. Sin embargo, el endpoint POST /invocations no lo hizo, lo que resultó en una omisión de la autenticación. Esta vulnerabilidad permite a usuarios no autorizados acceder a las mismas funciones de inferencia disponibles en endpoints protegidos, lo que podría exponer funcionalidades sensibles o permitir el acceso no deseado a recursos del backend.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2025-06-30 CVE Reserved
  • 2025-07-01 CVE Published
  • 2025-07-01 CVE Updated
  • 2025-07-26 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-306: Missing Authentication for Critical Function
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Redhat
Search vendor "Redhat"
Ai Inference Server
Search vendor "Redhat" for product "Ai Inference Server"
*-
Affected