APISIX Admin API default access token RCE
Title source: metasploitDescription
An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But there is still a risk to bypass the IP restriction of Apache APISIX's data panel. There is a check in the batch-requests plugin which overrides the client IP with its real remote IP. But due to a bug in the code, this check can be bypassed.
Exploits (12)
nomisec
WORKING POC
2 stars
by kavishkagihan · poc
https://github.com/kavishkagihan/CVE-2022-24112-POC
Nuclei Templates (1)
Apache APISIX - Remote Code Execution
CRITICALby Mr-xn
Shodan:
title:"Apache APISIX Dashboard" || http.title:"apache apisix dashboard"
FOFA:
title="Apache APISIX Dashboard" || title="apache apisix dashboard"
References (5)
Scores
CVSS v3
9.8
EPSS
0.9444
EPSS Percentile
100.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lab Environment
COMMUNITY
+4 more images
Community Lab
+8 more repos
Details
CISA KEV
2022-08-25
VulnCheck KEV
2022-08-19
InTheWild.io
2022-08-25
ENISA EUVD
EUVD-2022-29024
CWE
CWE-290
Status
published
Products (1)
apache/apisix
< 2.10.4
Published
Feb 11, 2022
KEV Added
Aug 25, 2022
Tracked Since
Feb 18, 2026