CVE-2026-25748 PUBLISHED

authentik has a forward authentication bypass with broken cookie

Assigner: GitHub_M
Reserved: 05.02.2026 Published: 12.02.2026 Updated: 17.02.2026

authentik is an open-source identity provider. Prior to 2025.10.4 and 2025.12.4, with a malformed cookie it was possible to bypass authentication when using forward authentication in the authentik Proxy Provider when used in conjunction with Traefik or Caddy as reverse proxy. When a malicious cookie was used, none of the authentik-specific X-Authentik-* headers were set which depending on application can grant access to an attacker. authentik 2025.10.4 and 2025.12.4 fix this issue.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
CVSS Score: 8.6

Product Status

Vendor goauthentik
Product authentik
Versions
  • Version >= 2025.10.0-rc1, < 2025.10.4 is affected
  • Version >= 2025.10.0-rc1, < 2025.12.4 is affected

References

Problem Types

  • CWE-287: Improper Authentication CWE