DEBIAN-CVE-2026-22797

Source
https://security-tracker.debian.org/tracker/CVE-2026-22797
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-22797.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-22797
Upstream
  • CVE-2026-22797
Downstream
Published
2026-01-19T18:16:04.950Z
Modified
2026-01-21T11:18:11.470218Z
Severity
  • 9.9 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L CVSS Calculator
Summary
[none]
Details

An issue was discovered in OpenStack keystonemiddleware 10.5 through 10.7 before 10.7.2, 10.8 and 10.9 before 10.9.1, and 10.10 through 10.12 before 10.12.1. The externaloauth2token middleware fails to sanitize incoming authentication headers before processing OAuth 2.0 tokens. By sending forged identity headers such as X-Is-Admin-Project, X-Roles, or X-User-Id, an authenticated attacker may escalate privileges or impersonate other users. All deployments using the externaloauth2token middleware are affected.

References

Affected packages

Debian:13 / python-keystonemiddleware

Package

Name
python-keystonemiddleware
Purl
pkg:deb/debian/python-keystonemiddleware?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
10.9.0-2+deb13u1

Affected versions

10.*
10.9.0-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-22797.json"

Debian:14 / python-keystonemiddleware

Package

Name
python-keystonemiddleware
Purl
pkg:deb/debian/python-keystonemiddleware?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
10.12.0-3

Affected versions

10.*
10.9.0-2
10.12.0-1
10.12.0-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-22797.json"