{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T06:30:58.908","vulnerabilities":[{"cve":{"id":"CVE-2026-25748","sourceIdentifier":"security-advisories@github.com","published":"2026-02-12T20:16:10.473","lastModified":"2026-02-19T15:23:42.360","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"authentik is an open-source identity provider. Prior to 2025.10.4 and 2025.12.4, with a malformed cookie it was possible to bypass authentication when using forward authentication in the authentik Proxy Provider when used in conjunction with Traefik or Caddy as reverse proxy. When a malicious cookie was used, none of the authentik-specific X-Authentik-* headers were set which depending on application can grant access to an attacker. authentik 2025.10.4 and 2025.12.4 fix this issue."},{"lang":"es","value":"authentik es un proveedor de identidad de código abierto. Antes de las versiones 2025.10.4 y 2025.12.4, con una cookie malformada era posible eludir la autenticación al usar la autenticación de reenvío en el Proveedor de Proxy de authentik cuando se utilizaba junto con Traefik o Caddy como proxy inverso. Cuando se utilizaba una cookie maliciosa, ninguno de los encabezados X-Authentik-* específicos de authentik se establecía, lo que, dependiendo de la aplicación, podía conceder acceso a un atacante. authentik 2025.10.4 y 2025.12.4 solucionan este problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:goauthentik:authentik:*:*:*:*:*:*:*:*","versionEndExcluding":"2025.10.4","matchCriteriaId":"D68BD58B-CB50-411F-862F-FF4F4F984239"},{"vulnerable":true,"criteria":"cpe:2.3:a:goauthentik:authentik:*:*:*:*:*:*:*:*","versionStartIncluding":"2025.12.0","versionEndExcluding":"2025.12.4","matchCriteriaId":"A59D4BC9-5FAE-4A4F-A109-D754BD80A10C"}]}]}],"references":[{"url":"https://github.com/goauthentik/authentik/releases/tag/version%2F2025.10.4","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/goauthentik/authentik/releases/tag/version%2F2025.12.4","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/goauthentik/authentik/security/advisories/GHSA-fj56-5763-j8pp","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}