NIXPKGS-2026-0252
GitHub issue
published on
Permalink
CVE-2026-25748
8.6 HIGH
- CVSS version (CVSS): 3.1
- Attack Vector (AV): Network (N)
- Attack Complexity (AC): Low (L)
- Privileges Required (PR): None (N)
- User Interaction (UI): None (N)
- Scope (S): Changed (C)
- Confidentiality (C): High (H)
- Integrity (I): None (N)
- Availability (A): None (N)
- Modified Attack Vector (MAV): Network (N)
- Modified Attack Complexity (MAC): Low (L)
- Modified Privileges Required (MPR): None (N)
- Modified User Interaction (MUI): None (N)
- Modified Confidentiality (MC): High (H)
- Modified Scope (MS): Changed (C)
- Modified Integrity (MI): None (N)
- Modified Availability (MA): None (N)
by @LeSuisse Activity log
- Created suggestion
-
@LeSuisse
ignored
3 packages
- authentik-outposts.ldap
- authentik-outposts.proxy
- authentik-outposts.radius
- @LeSuisse accepted
- @LeSuisse published on GitHub
authentik has a forward authentication bypass with broken cookie
authentik is an open-source identity provider. Prior to 2025.10.4 and 2025.12.4, with a malformed cookie it was possible to bypass authentication when using forward authentication in the authentik Proxy Provider when used in conjunction with Traefik or Caddy as reverse proxy. When a malicious cookie was used, none of the authentik-specific X-Authentik-* headers were set which depending on application can grant access to an attacker. authentik 2025.10.4 and 2025.12.4 fix this issue.
References
Affected products
authentik
- ==>= 2025.10.0-rc1, < 2025.10.4
- ==>= 2025.10.0-rc1, < 2025.12.4
Matching in nixpkgs
Ignored packages (3)
pkgs.authentik-outposts.ldap
The authentik ldap outpost. Needed for the external ldap API.
pkgs.authentik-outposts.proxy
Authentik proxy outpost which is used for HTTP reverse proxy authentication
Package maintainers
-
@jvanbruegge Jan van Brügge <supermanitu@gmail.com>
-
@rissson Marc Schmitt <marc.schmitt@risson.space>