PT-2026-32954 · Unknown · Oauth2 Proxy
Fnoehwm
+1
·
Published
2026-04-14
·
Updated
2026-04-15
·
CVE-2026-34454
CVSS v3.1
3.5
Low
| AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
Name of the Vulnerable Software and Affected Versions
OAuth2 Proxy versions 7.11.0 through 7.15.1
Description
A regression prevents the reverse proxy from clearing the session cookie when rendering the sign-in page. In deployments relying on the sign-in page for the logout flow, the browser session remains valid even when the sign-in page is displayed. This could allow a subsequent user on a shared workstation or device to access the previous user's authenticated session. Deployments using a dedicated logout/sign-out endpoint to terminate sessions are not affected.
Recommendations
Update to version 7.15.2.
Use the dedicated logout/sign-out endpoint of OAuth2 Proxy instead of relying on the sign-in page to clear sessions.
Ensure the application logout flow explicitly clears the OAuth2 Proxy session cookie before redirecting users to the sign-in page.
Clear the session cookie at the reverse proxy or application layer as a temporary mitigation.
Fix
Insufficient Session Expiration
Session Fixation
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Oauth2 Proxy