Lucene search

K
GoauthentikAuthentik

21 matches found

CVE
CVE
added 2023/08/29 6:15 p.m.2487 views

CVE-2023-39522

goauthentik is an open-source Identity Provider. In affected versions using a recovery flow with an identification stage an attacker is able to determine if a username exists. Only setups configured with a recovery flow are impacted by this. Anyone with a user account on a system with the recovery ...

5.3CVSS5AI score0.00514EPSS
CVE
CVE
added 2024/01/30 5:15 p.m.188 views

CVE-2024-23647

Authentik is an open-source Identity Provider. There is a bug in our implementation of PKCE that allows an attacker to circumvent the protection that PKCE offers. PKCE adds the code_challenge parameter to the authorization request and adds the code_verifier parameter to the token request. Prior to ...

8.8CVSS8.8AI score0.00072EPSS
CVE
CVE
added 2025/03/28 3:15 p.m.96 views

CVE-2025-29928

authentik is an open-source identity provider. Prior to versions 2024.12.4 and 2025.2.3, when authentik was configured to use the database for session storage (which is a non-default setting), deleting sessions via the Web Interface or the API would not revoke the session and the session holder wou...

8CVSS7AI score0.00041EPSS
CVE
CVE
added 2024/08/22 4:15 p.m.89 views

CVE-2024-42490

authentik is an open-source Identity Provider. Several API endpoints can be accessed by users without correct authentication/authorization. The main API endpoints affected by this are /api/v3/crypto/certificatekeypairs//view_certificate/, /api/v3/crypto/certificatekeypairs//view_private_key/, and /...

7.5CVSS7.6AI score0.00207EPSS
CVE
CVE
added 2024/06/28 6:15 p.m.83 views

CVE-2024-37905

authentik is an open-source Identity Provider that emphasizes flexibility and versatility. Authentik API-Access-Token mechanism can be exploited to gain admin user privileges. A successful exploit of the issue will result in a user gaining full admin access to the Authentik application, including r...

8.8CVSS8.9AI score0.0038EPSS
CVE
CVE
added 2022/12/28 1:15 a.m.82 views

CVE-2022-23555

authentik is an open-source Identity Provider focused on flexibility and versatility. Versions prior to 2022.11.4 and 2022.10.4 are vulnerable to Improper Authentication. Token reuse in invitation URLs leads to access control bypass via the use of a different enrollment flow than in the one provide...

9.4CVSS8.9AI score0.00066EPSS
CVE
CVE
added 2024/06/28 6:15 p.m.80 views

CVE-2024-38371

authentik is an open-source Identity Provider. Access restrictions assigned to an application were not checked when using the OAuth2 Device code flow. This could potentially allow users without the correct authorization to get OAuth tokens for an application and access it. This issue has been patch...

8.6CVSS8.7AI score0.0024EPSS
CVE
CVE
added 2024/11/21 6:15 p.m.80 views

CVE-2024-52287

authentik is an open-source identity provider. When using the client_credentials or device_code OAuth grants, it was possible for an attacker to get a token from authentik with scopes that haven't been configured in authentik. authentik 2024.8.5 and 2024.10.3 fix this issue.

6.4CVSS6.5AI score0.0009EPSS
CVE
CVE
added 2022/12/02 6:15 p.m.74 views

CVE-2022-46145

authentik is an open-source identity provider. Versions prior to 2022.11.2 and 2022.10.2 are vulnerable to unauthorized user creation and potential account takeover. With the default flows, unauthenticated users can create new accounts in authentik. If a flow exists that allows for email-verified p...

9.8CVSS9AI score0.02137EPSS
CVE
CVE
added 2024/09/27 4:15 p.m.56 views

CVE-2024-47070

authentik is an open-source identity provider. A vulnerability that exists in versions prior to 2024.8.3 and 2024.6.5 allows bypassing password login by adding X-Forwarded-For header with an unparsable IP address, e.g. a. This results in a possibility of logging into any account with a known login ...

9CVSS9.2AI score0.0015EPSS
CVE
CVE
added 2024/11/21 6:15 p.m.50 views

CVE-2024-52289

authentik is an open-source identity provider. Redirect URIs in the OAuth2 provider in authentik are checked by RegEx comparison.When no Redirect URIs are configured in a provider, authentik will automatically use the first redirect_uri value received as an allowed redirect URI, without escaping ch...

7.9CVSS6.5AI score0.00103EPSS
CVE
CVE
added 2024/09/27 4:15 p.m.46 views

CVE-2024-47077

authentik is an open-source identity provider. Prior to versions 2024.8.3 and 2024.6.5, access tokens issued to one application can be stolen by that application and used to impersonate the user against any other proxy provider. Also, a user can steal an access token they were legitimately issued f...

6.5CVSS6.3AI score0.00112EPSS
CVE
CVE
added 2023/03/04 1:15 a.m.44 views

CVE-2023-26481

authentik is an open-source Identity Provider. Due to an insufficient access check, a recovery flow link that is created by an admin (or sent via email by an admin) can be used to set the password for any arbitrary user. This attack is only possible if a recovery flow exists, which has both an Iden...

9.1CVSS7.2AI score0.00052EPSS
CVE
CVE
added 2023/10/31 4:15 p.m.43 views

CVE-2023-46249

authentik is an open-source Identity Provider. Prior to versions 2023.8.4 and 2023.10.2, when the default admin user has been deleted, it is potentially possible for an attacker to set the password of the default admin user without any authentication. authentik uses a blueprint to create the defaul...

9.8CVSS9.5AI score0.00614EPSS
CVE
CVE
added 2022/12/28 7:15 a.m.42 views

CVE-2022-46172

authentik is an open-source Identity provider focused on flexibility and versatility. In versions prior to 2022.10.4, and 2022.11.4, any authenticated user can create an arbitrary number of accounts through the default flows. This would circumvent any policy in a situation where it is undesirable f...

6.4CVSS6.5AI score0.00047EPSS
CVE
CVE
added 2024/11/21 6:15 p.m.36 views

CVE-2024-52307

authentik is an open-source identity provider. Due to the usage of a non-constant time comparison for the /-/metrics/ endpoint it was possible to brute-force the SECRET_KEY, which is used to authenticate the endpoint. The /-/metrics/ endpoint returns Prometheus metrics and is not intended to be acc...

6.3CVSS6.6AI score0.00122EPSS
CVE
CVE
added 2024/01/11 6:15 a.m.32 views

CVE-2024-21637

Authentik is an open-source Identity Provider. Authentik is a vulnerable to a reflected Cross-Site Scripting vulnerability via JavaScript-URIs in OpenID Connect flows with response_mode=form_post. This relatively user could use the described attacks to perform a privilege escalation. This vulnerabi...

7.6CVSS5.3AI score0.00126EPSS
CVE
CVE
added 2023/07/06 7:15 p.m.30 views

CVE-2023-36456

authentik is an open-source Identity Provider. Prior to versions 2023.4.3 and 2023.5.5, authentik does not verify the source of the X-Forwarded-For and X-Real-IP headers, both in the Python code and the go code. Only authentik setups that are directly accessible by users without a reverse proxy are...

8.3CVSS7.7AI score0.00418EPSS
CVE
CVE
added 2023/11/21 9:15 p.m.22 views

CVE-2023-48228

authentik is an open-source identity provider. When initialising a oauth2 flow with a code_challenge and code_method (thus requesting PKCE), the single sign-on provider (authentik) must check if there is a matching and existing code_verifier during the token step. Prior to versions 2023.10.4 and 20...

9.8CVSS8.5AI score0.00676EPSS
CVE
CVE
added 2025/06/27 3:15 p.m.11 views

CVE-2025-52553

authentik is an open-source identity provider. After authorizing access to a RAC endpoint, authentik creates a token which is used for a single connection and is sent to the client in the URL. This token is intended to only be valid for the session of the user who authorized the connection, however...

5.5CVSS6.4AI score0.00054EPSS
CVE
CVE
added 2 days ago6 views

CVE-2025-53942

authentik is an open-source Identity Provider that emphasizes flexibility and versatility, with support for a wide set of protocols. In versions 2025.4.4 and earlier, as well as versions 2025.6.0-rc1 through 2025.6.3, deactivated users who registered through OAuth/SAML or linked their accounts to O...

7.1CVSS6.1AI score