Vulnerabilities > Apache > Apisix

DATE CVE VULNERABILITY TITLE RISK
2023-10-10 CVE-2023-44487 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. 7.5
2022-04-20 CVE-2022-29266 Information Exposure Through an Error Message vulnerability in Apache Apisix
In APache APISIX before 3.13.1, the jwt-auth plugin has a security issue that leaks the user's secret key because the error message returned from the dependency lua-resty-jwt contains sensitive information.
network
low complexity
apache CWE-209
7.5
2022-03-28 CVE-2022-25757 Improper Input Validation vulnerability in Apache Apisix
In Apache APISIX before 2.13.0, when decoding JSON with duplicate keys, lua-cjson will choose the last occurred value as the result.
network
low complexity
apache CWE-20
critical
9.8
2022-02-11 CVE-2022-24112 Authentication Bypass by Spoofing vulnerability in Apache Apisix
An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API.
network
low complexity
apache CWE-290
critical
9.8
2021-11-22 CVE-2021-43557 Command Injection vulnerability in Apache Apisix
The uri-block plugin in Apache APISIX before 2.10.2 uses $request_uri without verification.
network
low complexity
apache CWE-77
7.5
2020-12-07 CVE-2020-13945 Unspecified vulnerability in Apache Apisix
In Apache APISIX, the user enabled the Admin API and deleted the Admin API access IP restriction rules.
network
low complexity
apache
6.5