First published: Mon Mar 03 2025(Updated: )
### Impact User enumeration in database authentication in Flask-AppBuilder <= 4.5.3 and werkzeug >= 3.0.0. Allows for a non authenticated user to enumerate existing usernames by timing the response time from the server when brute forcing requests to login. ### Patches Upgrade to flask-appbuilder>=4.5.3 ### Workarounds Downgrade werkzeug to <3.0.0 ### References _Are there any links users can visit to find out more?_
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Flask-AppBuilder | <4.5.3 | |
pip/flask-appbuilder | <4.5.3 | 4.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-24023 has a medium severity level due to its potential for username enumeration by unauthenticated users.
To fix CVE-2025-24023, upgrade Flask-AppBuilder to version 4.5.3 or later.
CVE-2025-24023 allows attackers to predict valid usernames by measuring response times during login attempts.
CVE-2025-24023 affects all Flask-AppBuilder installations prior to version 4.5.3.
CVE-2025-24023 is a remote vulnerability, as it can be exploited by unauthenticated users over the network.