CVE-2026-40574 PUBLISHED

OAuth2 Proxy has an Authorization Bypass in Email Domain Validation via Malformed Multi-@ Email Claims

Assigner: GitHub_M
Reserved: 14.04.2026 Published: 21.04.2026 Updated: 21.04.2026

OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 providers. Prior to 7.15.2, an authorization bypass exists in OAuth2 Proxy as part of the email_domain enforcement option. An attacker may be able to authenticate with an email claim such as attacker@evil.com@company.com and satisfy an allowed domain check for company.com, even though the claim is not a valid email address. The issue ONLY affects deployments that rely on email_domain restrictions and accept email claim values from identity providers or claim mappings that do not strictly enforce normal email syntax. This vulnerability is fixed in 7.15.2.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
CVSS Score: 6.8

Product Status

Vendor oauth2-proxy
Product oauth2-proxy
Versions
  • Version < 7.15.2 is affected

References

Problem Types

  • CWE-863: Incorrect Authorization CWE