{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T05:52:02.960","vulnerabilities":[{"cve":{"id":"CVE-2022-46172","sourceIdentifier":"security-advisories@github.com","published":"2022-12-28T07:15:07.833","lastModified":"2024-11-21T07:30:15.367","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"authentik is an open-source Identity provider focused on flexibility and versatility. In versions prior to 2022.10.4, and 2022.11.4, any authenticated user can create an arbitrary number of accounts through the default flows. This would circumvent any policy in a situation where it is undesirable for users to create new accounts by themselves. This may also affect other applications as these new basic accounts would exist throughout the SSO infrastructure. By default the newly created accounts cannot be logged into as no password reset exists by default. However password resets are likely to be enabled by most installations. This vulnerability pertains to the user context used in the default-user-settings-flow, /api/v3/flows/instances/default-user-settings-flow/execute/. This issue has been fixed in versions 2022.10.4 and 2022.11.4."},{"lang":"es","value":"authentik es un proveedor de identidad de código abierto centrado en la flexibilidad y la versatilidad. En versiones anteriores a 2022.10.4 y 2022.11.4, cualquier usuario autenticado puede crear una cantidad arbitraria de cuentas a través de los flujos predeterminados. Esto omitiría cualquier política en una situación en la que no sea deseable que los usuarios creen nuevas cuentas por sí mismos. Esto también puede afectar a otras aplicaciones, ya que estas nuevas cuentas básicas existirían en toda la infraestructura de SSO. De forma predeterminada, no se puede iniciar sesión en las cuentas recién creadas ya que no existe ningún restablecimiento de contraseña. Sin embargo, es probable que la mayoría de las instalaciones habiliten el restablecimiento de contraseñas. Esta vulnerabilidad pertenece al contexto de usuario utilizado en el flujo de configuración de usuario predeterminado, /api/v3/flows/instances/default-user-settings-flow/execute/. Este problema se solucionó en las versiones 2022.10.4 y 2022.11.4."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L","baseScore":6.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.1,"impactScore":2.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L","baseScore":6.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.1,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-269"},{"lang":"en","value":"CWE-287"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-269"},{"lang":"en","value":"CWE-287"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:goauthentik:authentik:*:*:*:*:*:*:*:*","versionStartIncluding":"2022.10.0","versionEndExcluding":"2022.10.4","matchCriteriaId":"99BE347E-A6BA-42EA-98CE-AFAE2F5D4A37"},{"vulnerable":true,"criteria":"cpe:2.3:a:goauthentik:authentik:*:*:*:*:*:*:*:*","versionStartIncluding":"2022.11.0","versionEndExcluding":"2022.11.4","matchCriteriaId":"1F1325E1-8B8D-4E34-A443-646C43280671"}]}]}],"references":[{"url":"https://github.com/goauthentik/authentik/security/advisories/GHSA-hv8r-6w7p-mpc5","source":"security-advisories@github.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/goauthentik/authentik/security/advisories/GHSA-hv8r-6w7p-mpc5","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}