Cyber Posture

CVE-2025-49827

Critical

Published: 15 July 2025

Published
15 July 2025
Modified
04 November 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0019 40.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-49827 is a critical-severity Reliance on Untrusted Inputs in a Security Decision (CWE-807) vulnerability in Cyberark Conjur. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 40.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the vulnerability by identifying, reporting, and applying vendor patches that fix the malformed regular expression in the IAM authenticator.

prevent

Validates untrusted inputs such as manipulated AWS-signed headers to prevent redirection of authentication validation requests to malicious servers.

prevent

Limits impact of successful authenticator bypass by enforcing least privilege on the permissions associated with impersonated clients.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Direct remote authentication bypass in a public-facing secrets management service (Conjur IAM authenticator) via header manipulation and regex flaw, enabling unauthorized access without credentials.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Conjur provides secrets management and application identity for infrastructure. Conjur OSS versions 1.19.5 through 1.22.0 and Secrets Manager, Self-Hosted (formerly known as Conjur Enterprise) 13.1 through 13.5 and 13.6 are vulnerable to bypass of the IAM authenticator. An attacker who…

more

can manipulate the headers signed by AWS can take advantage of a malformed regular expression to redirect the authentication validation request that Secrets Manager, Self-Hosted sends to AWS to a malicious server controlled by the attacker. This redirection could result in a bypass of the Secrets Manager, Self-Hosted IAM Authenticator, granting the attacker the permissions granted to the client whose request was manipulated. This issue affects both Secrets Manager, Self-Hosted (formerly Conjur Enterprise) and Conjur OSS. Conjur OSS version 1.22.1 and Secrets Manager, Self-Hosted versions 13.5.1 and 13.6.1 fix the issue.

Deeper analysisAI

CVE-2025-49827 is a vulnerability in the IAM authenticator of Conjur OSS versions 1.19.5 through 1.22.0 and Secrets Manager, Self-Hosted (formerly Conjur Enterprise) versions 13.1 through 13.5 and 13.6. Conjur provides secrets management and application identity for infrastructure. The flaw stems from a malformed regular expression that enables attackers to redirect authentication validation requests sent to AWS to a malicious server under their control, bypassing the IAM authenticator. It is rated with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-807 (Reliance on Untrusted Inputs in a Security Decision).

An attacker capable of manipulating headers signed by AWS can exploit this issue remotely with low complexity and no privileges or user interaction required. By altering the headers, the attacker redirects the validation request to their controlled server, impersonating a legitimate client and gaining the permissions associated with that client's authentication. This results in high confidentiality, integrity, and availability impacts, potentially allowing unauthorized access to secrets and resources managed by the affected Conjur instances.

Advisories recommend upgrading to fixed versions: Conjur OSS 1.22.1, Secrets Manager Self-Hosted 13.5.1, and 13.6.1. Detailed information is available in the GitHub security advisory (GHSA-gmc5-9mpc-xg75) and release notes for Conjur v1.22.1, along with announcements on oss-security mailing lists.

Details

CWE(s)

Affected Products

cyberark
conjur
1.19.5 — 1.22.1 · 13.1 — 13.5.1

CVEs Like This One

CVE-2025-49828Same product: Cyberark Conjur
CVE-2025-49831Same product: Cyberark Conjur
CVE-2026-29134Shared CWE-807
CVE-2026-32975Shared CWE-807
CVE-2026-2914Same vendor: Cyberark
CVE-2025-13926Shared CWE-807
CVE-2026-35670Shared CWE-807
CVE-2025-66374Same vendor: Cyberark
CVE-2026-27707Shared CWE-807
CVE-2025-1126Shared CWE-807

References