CVE-2026-25748

Source
https://cve.org/CVERecord?id=CVE-2026-25748
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25748.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-25748
Aliases
  • GHSA-fj56-5763-j8pp
Published
2026-02-12T19:36:45.631Z
Modified
2026-02-21T10:05:44.010965Z
Severity
  • 8.6 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N CVSS Calculator
Summary
authentik has a forward authentication bypass with broken cookie
Details

authentik is an open-source identity provider. Prior to 2025.10.4 and 2025.12.4, with a malformed cookie it was possible to bypass authentication when using forward authentication in the authentik Proxy Provider when used in conjunction with Traefik or Caddy as reverse proxy. When a malicious cookie was used, none of the authentik-specific X-Authentik-* headers were set which depending on application can grant access to an attacker. authentik 2025.10.4 and 2025.12.4 fix this issue.

Database specific
{
    "cwe_ids": [
        "CWE-287"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25748.json"
}
References

Affected packages

Git / github.com/goauthentik/authentik

Affected ranges

Type
GIT
Repo
https://github.com/goauthentik/authentik
Events

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25748.json"