CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2024-12225: Io.quarkus:quarkus-security-webauthn: quarkus webauthn unexpected authentication bypass

Description

A vulnerability was found in Quarkus in the quarkus-security-webauthn module. The Quarkus WebAuthn module publishes default REST endpoints for registering and logging users in while allowing developers to provide custom REST endpoints. When developers provide custom REST endpoints, the default endpoints remain accessible, potentially allowing attackers to obtain a login cookie that has no corresponding user in the Quarkus application or, depending on how the application is written, could correspond to an existing user that has no relation with the current attacker, allowing anyone to log in as an existing user by just knowing that user's user name.

Classification

CVE ID: CVE-2024-12225

Problem Types

Authentication Bypass Using an Alternate Path or Channel

Affected Products

Vendor: , Red Hat

Product: , Red Hat build of Quarkus

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 11.06% (scored less or equal to compared to others)

EPSS Date: 2025-06-04 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2024-12225
https://access.redhat.com/security/cve/CVE-2024-12225
https://bugzilla.redhat.com/show_bug.cgi?id=2330484

Timeline