PT-2025-31437 · Unknown · Oauth2 Proxy
Tuunit
·
Published
2025-07-30
·
Updated
2025-08-01
·
CVE-2025-54576
9.1
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
**Name of the Vulnerable Software and Affected Versions:**
OAuth2-Proxy versions 7.10.0 and earlier
**Description:**
OAuth2-Proxy deployments using the `skip auth routes` configuration option with regex patterns are vulnerable to authentication bypass. Attackers can craft URLs with malicious query parameters that satisfy the configured regex patterns, potentially gaining unauthorized access to protected resources. The issue arises because `skip auth routes` incorrectly matches against the full request URI (path and query parameters) instead of only the path. Deployments utilizing wildcard or broad matching patterns in `skip auth routes` are particularly at risk. Approximately 27,800 services and 34,000+ results are found to be affected.
**Recommendations:**
OAuth2-Proxy versions prior to 7.11.0 are vulnerable.
- Upgrade to version 7.11.0 or later to resolve this issue.
- Audit all `skip auth routes` configurations for overly permissive patterns.
- Replace wildcard patterns with exact path matches where possible.
- Ensure regex patterns are properly anchored, starting with `^` and ending with `$`.
- Implement custom validation to strip query parameters before regex matching.
Fix
RCE
Authentication Bypass by Spoofing
Weakness Enumeration
Related Identifiers
Affected Products
References · 29
- https://nvd.nist.gov/vuln/detail/CVE-2025-54576 · Security Note
- https://osv.dev/vulnerability/BIT-oauth2-proxy-2025-54576 · Vendor Advisory
- https://osv.dev/vulnerability/GHSA-7rh7-c77v-6434 · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2025-54576 · Vendor Advisory
- https://github.com/oauth2-proxy/oauth2-proxy⭐ 11713 🔗 1758 · Note
- https://github.com/oauth2-proxy/oauth2-proxy/blob/f4b33b64bd66ad28e9b0d63bea51837b83c00ca1/pkg/requests/util/util.go#L37-L44⭐ 11707 🔗 1757 · Note
- https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-7rh7-c77v-6434⭐ 11707 🔗 1757 · Note
- https://github.com/oauth2-proxy/oauth2-proxy/commit/9ffafad4b2d2f9f7668e5504565f356a7c047b77⭐ 11707 🔗 1757 · Note
- https://github.com/oauth2-proxy/oauth2-proxy/blob/f4b33b64bd66ad28e9b0d63bea51837b83c00ca1/oauthproxy.go#L582-L584⭐ 11707 🔗 1757 · Note
- https://github.com/oauth2-proxy/oauth2-proxy/releases/tag/v7.11.0⭐ 11707 🔗 1757 · Note
- https://t.me/pentestingnews/65480 · Telegram Post
- https://twitter.com/CVEnew/status/1950645210733756672 · Twitter Post
- https://twitter.com/socradar/status/1951244018798485795 · Twitter Post
- https://twitter.com/fridaysecurity/status/1950744228243411187 · Twitter Post
- https://twitter.com/the_yellow_fall/status/1950744174460109157 · Twitter Post