PyPI: ethyca-fides

CVE-2024-52008

Safety vulnerability ID: SFTY-20241126-12312

Safety legacy ID: pyup.io-74436

Versions ethyca-fides are vulnerable to Client-Side Enforcement of Server-Side Security (CWE-602). The user invite acceptance API endpoint lacks server-side password policy enforcement, allowing users to set weak passwords by bypassing client-side validations. This vulnerability enables attackers to compromise accounts through brute-force or guessing attacks using easily obtainable passwords.

Created at: Nov 5, 2025Updated at: Nov 5, 2025

Overview

Password Policy Bypass Vulnerability in Fides Webserver User Accept Invite API

Advisory

Versions ethyca-fides are vulnerable to Client-Side Enforcement of Server-Side Security (CWE-602). The user invite acceptance API endpoint lacks server-side password policy enforcement, allowing users to set weak passwords by bypassing client-side validations. This vulnerability enables attackers to compromise accounts through brute-force or guessing attacks using easily obtainable passwords.

Affected Package

Affecting ethyca-fides package, versions
<2.50.0

Also affects

---

How to Fix

Upgrade
ethyca-fides
to
2.50.0
or higher.

Mitigation and Workarounds

---

Vulnerable Functions

Functions linked to known vulnerabilities.

Vulnerable function data is available for Enterprise customers

Book a call with us to see Safety in action.

Safety

Verified by Safety

Our Cybersecurity Intelligence Team reviewed this vulnerability. We combine public data with our own research to find issues not yet reported to public sources.

Learn more