Impact
• Vulnerability Type: CWE-295 – Improper Certificate Validation
• Affected Component: metadata-ingestion/src/datahub/ingestion/source/ldap.py
Technical Details
The LDAP ingestion source explicitly weakens TLS certificate validation using the following hardcoded configuration:
ldap.set_option(ldap.OPT_X_TLS_REQUIRE_CERT, ldap.OPT_X_TLS_ALLOW)
The OPT_X_TLS_ALLOW setting accepts TLS connections even when certificate validation fails (including hostname mismatch and untrusted issuers). This allows an attacker to present a rogue certificate and successfully intercept LDAPS credentials.
Additional Severity Factor
The vulnerability is compounded by two issues:
- NO CA Certificate Configuration Option Exists
There is no configuration parameter in LDAPSourceConfig to specify a trusted CA certificate file (OPT_X_TLS_CACERTFILE).
- OPT_X_TLS_ALLOW Ignores Validation Failures
Even if a CA certificate option were added, the hardcoded OPT_X_TLS_ALLOW setting would ignore validation failures anyway.
Patches
Issue has been fixed in latest codebase.
Workarounds
Ensure DataHub deployment is only exposing necessary external services, this is typically set up on a fully internal network between DataHub and the LDAP deployment and would only be exploitable if the network itself were compromised.
References
https://www.wiz.io/vulnerability-database/cve/cve-2025-12765 Similar issue
Credit
Credit for finding this vulnerability to Arad Inbar, Nir Somech, and Ben Grinberg (DREAM)
Impact
• Vulnerability Type: CWE-295 – Improper Certificate Validation
• Affected Component: metadata-ingestion/src/datahub/ingestion/source/ldap.py
Technical Details
The LDAP ingestion source explicitly weakens TLS certificate validation using the following hardcoded configuration:
ldap.set_option(ldap.OPT_X_TLS_REQUIRE_CERT, ldap.OPT_X_TLS_ALLOW)The OPT_X_TLS_ALLOW setting accepts TLS connections even when certificate validation fails (including hostname mismatch and untrusted issuers). This allows an attacker to present a rogue certificate and successfully intercept LDAPS credentials.
Additional Severity Factor
The vulnerability is compounded by two issues:
There is no configuration parameter in LDAPSourceConfig to specify a trusted CA certificate file (OPT_X_TLS_CACERTFILE).
Even if a CA certificate option were added, the hardcoded OPT_X_TLS_ALLOW setting would ignore validation failures anyway.
Patches
Issue has been fixed in latest codebase.
Workarounds
Ensure DataHub deployment is only exposing necessary external services, this is typically set up on a fully internal network between DataHub and the LDAP deployment and would only be exploitable if the network itself were compromised.
References
https://www.wiz.io/vulnerability-database/cve/cve-2025-12765 Similar issue
Credit
Credit for finding this vulnerability to Arad Inbar, Nir Somech, and Ben Grinberg (DREAM)