NIXPKGS-2026-0251
GitHub issue
published on
Permalink
CVE-2026-25227
9.1 CRITICAL
- CVSS version (CVSS): 3.1
- Attack Vector (AV): Network (N)
- Attack Complexity (AC): Low (L)
- Privileges Required (PR): High (H)
- User Interaction (UI): None (N)
- Scope (S): Changed (C)
- Confidentiality (C): High (H)
- Integrity (I): High (H)
- Availability (A): High (H)
- Modified Attack Vector (MAV): Network (N)
- Modified Attack Complexity (MAC): Low (L)
- Modified Privileges Required (MPR): High (H)
- Modified User Interaction (MUI): None (N)
- Modified Confidentiality (MC): High (H)
- Modified Scope (MS): Changed (C)
- Modified Integrity (MI): High (H)
- Modified Availability (MA): High (H)
by @LeSuisse Activity log
- Created suggestion
-
@LeSuisse
ignored
3 packages
- authentik-outposts.ldap
- authentik-outposts.proxy
- authentik-outposts.radius
- @LeSuisse accepted
- @LeSuisse published on GitHub
authentik affected by Remote Code Execution via Context Key Injection in PropertyMapping Test Endpoint
authentik is an open-source identity provider. From 2021.3.1 to before 2025.8.6, 2025.10.4, and 2025.12.4, when using delegated permissions, a User that has the permission Can view * Property Mapping or Can view Expression Policy is able to execute arbitrary code within the authentik server container through the test endpoint, which is intended to preview how a property mapping/policy works. authentik 2025.8.6, 2025.10.4, and 2025.12.4 fix this issue.
References
-
https://github.com/goauthentik/authentik/security/advisories/GHSA-qvxx-mfm6-626f x_refsource_CONFIRM
Affected products
authentik
- ==>= 2025.10.0-rc1, < 2025.10.4
- ==>= 2025.10.0-rc1, < 2025.12.4
- ==>= 2021.3.1, < 2025.8.6
Matching in nixpkgs
Ignored packages (3)
pkgs.authentik-outposts.ldap
The authentik ldap outpost. Needed for the external ldap API.
pkgs.authentik-outposts.proxy
Authentik proxy outpost which is used for HTTP reverse proxy authentication
Package maintainers
-
@jvanbruegge Jan van Brügge <supermanitu@gmail.com>
-
@rissson Marc Schmitt <marc.schmitt@risson.space>