Vulnerability Description
Zerobyte is a backup automation tool Zerobyte versions prior to 0.18.5 and 0.19.0 contain an authentication bypass vulnerability where authentication middleware is not properly applied to API endpoints. This results in certain API endpoints being accessible without valid session credentials. This is dangerous for those who have exposed Zerobyte to be used outside of their internal network. A fix has been applied in both version 0.19.0 and 0.18.5. If immediate upgrade is not possible, restrict network access to the Zerobyte instance to trusted networks only using firewall rules or network segmentation. This is only a temporary mitigation; upgrading is strongly recommended.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nicotsx | Zerobyte | < 0.18.5 |
Related Weaknesses (CWE)
References
- https://github.com/nicotsx/zerobyte/commit/13e080a18967705bd2b4e110e5f7693fdca1cPatch
- https://github.com/nicotsx/zerobyte/issues/161Issue Tracking
- https://github.com/nicotsx/zerobyte/security/advisories/GHSA-x539-c98q-38gvMitigationPatchVendor Advisory
FAQ
What is CVE-2025-68435?
CVE-2025-68435 is a vulnerability with a CVSS score of 9.1 (CRITICAL). Zerobyte is a backup automation tool Zerobyte versions prior to 0.18.5 and 0.19.0 contain an authentication bypass vulnerability where authentication middleware is not properly applied to API endpoint...
How severe is CVE-2025-68435?
CVE-2025-68435 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-68435?
Check the references section above for vendor advisories and patch information. Affected products include: Nicotsx Zerobyte.