The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-54864

CVE-2025-54864: NixOS Hydra DOS Vulnerability

CVE-2025-54864 is a denial of service vulnerability in NixOS Hydra affecting API endpoints that lack proper authentication. Attackers can trigger resource-intensive evaluations. This article covers technical details, affected versions, impact, and mitigation steps.

Updated: May 11, 2026

CVE-2025-54864 Overview

CVE-2025-54864 affects Hydra, a continuous integration service for Nix-based projects. The /api/push-github and /api/push-gitea endpoints lack HTTP Basic authentication, allowing unauthenticated remote callers to trigger Hydra evaluations. While both forges support HMAC signing with a secret key, the affected endpoints did not validate signatures before processing requests. Triggering large evaluations is resource-intensive and can exhaust CPU and memory on the evaluator host, creating a denial of service condition. The flaw is tracked as Missing Authentication for Critical Function [CWE-306] and was patched in commit f7bda02.

Critical Impact

Unauthenticated network attackers can trigger expensive Hydra evaluations on demand, exhausting evaluator resources and degrading or halting continuous integration services.

Affected Products

  • NixOS Hydra prior to commit f7bda02
  • Hydra instances exposing /api/push-github to the public internet
  • Hydra instances exposing /api/push-gitea to the public internet

Discovery Timeline

  • 2025-08-12 - CVE-2025-54864 published to NVD
  • 2025-09-22 - Last updated in NVD database

Technical Details for CVE-2025-54864

Vulnerability Analysis

Hydra exposes webhook endpoints that GitHub and Gitea call to notify the CI service of repository changes. The endpoints /api/push-github and /api/push-gitea are reached without HTTP Basic authentication. Both forges support HMAC-based request signing using a shared secret, but Hydra did not verify those signatures prior to commit f7bda02. Any network-positioned attacker who can reach the Hydra host can therefore invoke the push endpoints directly. Each invocation can schedule an evaluation, and evaluations on large Nix projects consume substantial CPU, memory, and disk I/O. Repeated or concurrent invocations amplify resource consumption and produce a denial of service on the evaluator.

Root Cause

The root cause is missing authentication on critical webhook endpoints [CWE-306]. Hydra trusted the inbound request without validating the HMAC signature header supplied by GitHub or Gitea. Because evaluation triggering is an expensive operation, the absence of an authentication check converts a routine webhook into a resource amplification primitive.

Attack Vector

The attack vector is the network. An attacker sends crafted HTTP POST requests to the Hydra host targeting /api/push-github or /api/push-gitea. No credentials, user interaction, or prior access are required. Repeated requests force the evaluator to perform expensive Nix evaluations, leading to CPU exhaustion and service degradation.

text
 use Digest::SHA qw(sha256_hex);
 use Text::Diff;
 use IPC::Run qw(run);
+use Digest::SHA qw(hmac_sha256_hex);
+use String::Compare::ConstantTime qw(equals);
 
 
 sub api : Chained('/') PathPart('api') CaptureArgs(0) {

Source: NixOS/hydra commit f7bda02. The patch introduces hmac_sha256_hex for signature computation and String::Compare::ConstantTime::equals for constant-time comparison, enforcing HMAC validation on the push endpoints.

Detection Methods for CVE-2025-54864

Indicators of Compromise

  • High-volume or repeated POST requests to /api/push-github or /api/push-gitea from source IPs outside the configured GitHub or Gitea webhook ranges.
  • Spikes in hydra-evaluator CPU, memory, or run-queue length not correlated with legitimate commit activity.
  • Hydra evaluation queue backlog growing without corresponding repository push events.

Detection Strategies

  • Inspect Hydra access logs and reverse proxy logs for unauthenticated calls to the two push endpoints that lack a valid X-Hub-Signature-256 or Gitea signature header.
  • Correlate webhook delivery events from GitHub or Gitea audit logs against Hydra-side request counts to identify excess requests with no upstream origin.
  • Alert when evaluator host resource utilization sustains above baseline while no scheduled or push-driven evaluations are expected.

Monitoring Recommendations

  • Forward Hydra and reverse proxy logs to a centralized logging or SIEM pipeline and create rules for request rate anomalies on /api/push-* paths.
  • Monitor evaluator process metrics (CPU, RSS, fork rate) and alert on sustained deviations from baseline.
  • Track source IP distribution for push endpoint callers and flag any that are not GitHub or Gitea hook origins.

How to Mitigate CVE-2025-54864

Immediate Actions Required

  • Update Hydra to a build that includes commit f7bda02 or later, which enforces HMAC signature validation on /api/push-github and /api/push-gitea.
  • Configure the shared HMAC secret in both Hydra and the corresponding GitHub or Gitea webhook so signed requests verify successfully.
  • Restrict network reachability of the Hydra web interface to known forge source ranges where operationally feasible.

Patch Information

The issue is fixed in NixOS Hydra commit f7bda020c6144913f134ec616783e57817f7686f. Full details are published in GitHub Security Advisory GHSA-qpq3-646c-vgx9. The fix introduces hmac_sha256_hex signature computation and constant-time comparison via String::Compare::ConstantTime::equals.

Workarounds

  • Block /api/push-github and /api/push-gitea at a reverse proxy in front of Hydra if patching is not immediately possible.
  • Allowlist only the published GitHub and Gitea webhook IP ranges at the proxy or firewall layer.
  • Apply rate limiting on the push endpoints to cap evaluation triggers per source IP.
bash
# nginx example: block public access to Hydra push endpoints
location ~ ^/api/push-(github|gitea)$ {
    allow 140.82.112.0/20;   # GitHub webhook range (verify current list)
    allow 192.30.252.0/22;   # GitHub webhook range (verify current list)
    deny all;
    proxy_pass http://hydra_upstream;
}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechNixos Hydra

  • SeverityMEDIUM

  • CVSS Score6.9

  • EPSS Probability0.08%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-306
  • Vendor Resources
  • GitHub Commit Change

  • GitHub Security Advisory GHSA-qpq3-646c-vgx9
  • Latest CVEs
  • CVE-2026-8468: Elixir Plug Library DoS Vulnerability

  • CVE-2026-8295: simdjson Information Disclosure Vulnerability

  • CVE-2025-68421: Comarch ERP Optima Auth Bypass Vulnerability

  • CVE-2025-68420: Comarch ERP Optima Privilege Escalation
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English