Lucene search

K
GoauthentikAuthentik

4 matches found

CVE
CVE
added 2024/01/30 5:15 p.m.189 views

CVE-2024-23647

Authentik is an open-source Identity Provider. There is a bug in our implementation of PKCE that allows an attacker to circumvent the protection that PKCE offers. PKCE adds the code_challenge parameter to the authorization request and adds the code_verifier parameter to the token request. Prior to ...

8.8CVSS8.8AI score0.00041EPSS
CVE
CVE
added 2025/03/28 3:15 p.m.98 views

CVE-2025-29928

authentik is an open-source identity provider. Prior to versions 2024.12.4 and 2025.2.3, when authentik was configured to use the database for session storage (which is a non-default setting), deleting sessions via the Web Interface or the API would not revoke the session and the session holder wou...

8CVSS7AI score0.00032EPSS
CVE
CVE
added 2024/06/28 6:15 p.m.85 views

CVE-2024-37905

authentik is an open-source Identity Provider that emphasizes flexibility and versatility. Authentik API-Access-Token mechanism can be exploited to gain admin user privileges. A successful exploit of the issue will result in a user gaining full admin access to the Authentik application, including r...

8.8CVSS8.9AI score0.01573EPSS
CVE
CVE
added 2023/07/06 7:15 p.m.31 views

CVE-2023-36456

authentik is an open-source Identity Provider. Prior to versions 2023.4.3 and 2023.5.5, authentik does not verify the source of the X-Forwarded-For and X-Real-IP headers, both in the Python code and the go code. Only authentik setups that are directly accessible by users without a reverse proxy are...

8.3CVSS7.7AI score0.00303EPSS