NIXPKGS-2026-0252
GitHub issue
published on 15 Feb 2026
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
3 packages
- authentik-outposts.ldap
- authentik-outposts.proxy
- authentik-outposts.radius
- @LeSuisse accepted
- @LeSuisse published on GitHub
authentik has a forward authentication bypass with broken cookie
authentik is an open-source identity provider. Prior to 2025.10.4 and 2025.12.4, with a malformed cookie it was possible to bypass authentication when using forward authentication in the authentik Proxy Provider when used in conjunction with Traefik or Caddy as reverse proxy. When a malicious cookie was used, none of the authentik-specific X-Authentik-* headers were set which depending on application can grant access to an attacker. authentik 2025.10.4 and 2025.12.4 fix this issue.
References
-
https://github.com/goauthentik/authentik/security/advisories/GHSA-fj56-5763-j8pp x_refsource_CONFIRM
-
https://github.com/goauthentik/authentik/security/advisories/GHSA-fj56-5763-j8pp x_refsource_CONFIRM
Affected products
authentik
- ==>= 2025.10.0-rc1, < 2025.12.4
- ==>= 2025.10.0-rc1, < 2025.10.4
Package maintainers
-
@jvanbruegge Jan van Brügge <supermanitu@gmail.com>
-
@rissson Marc Schmitt <marc.schmitt@risson.space>