An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But there is still a risk to bypass the IP restriction of Apache APISIX's data panel. There is a check in the batch-requests plugin which overrides the client IP with its real remote IP. But due to a bug in the code, this check can be bypassed.

Project Subscriptions

Vendors Products
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

1. explicitly configure the enabled plugins in `conf/config.yaml`, ensure `batch-requests` is disabled. (Or just comment out `batch-requests` in `conf/config-default.yaml`) Or 1. upgrade to 2.10.4 or 2.12.1.

History

Wed, 22 Oct 2025 00:30:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.94415}

epss

{'score': 0.9434}


Wed, 29 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2022-08-25'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-10-21T23:15:46.674Z

Reserved: 2022-01-28T00:00:00.000Z

Link: CVE-2022-24112

cve-icon Vulnrichment

Updated: 2024-08-03T03:59:23.660Z

cve-icon NVD

Status : Analyzed

Published: 2022-02-11T13:15:08.073

Modified: 2025-10-23T14:48:48.137

Link: CVE-2022-24112

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses