CVE-2026-25922: RCE — Patch Guide
CVE-2026-25922
authentik is an open-source identity provider. Prior to 2025.8.6, 2025.10.4, and 2025.12.4, when using a SAML Source that has the option Verify Assertion Signature under Verification Certificate enabl...
Overview
A critical security vulnerability has been identified in the authentik open-source identity provider. This flaw could allow an attacker to bypass authentication controls and impersonate legitimate users.
Vulnerability Explained
authentik uses the SAML protocol for single sign-on. In affected versions, a specific misconfiguration in SAML Sources creates a security weakness. If an administrator has enabled “Verify Assertion Signature” but not “Verify Response Signature,” or has left the “Encryption Certificate” setting blank, the system becomes vulnerable.
In simple terms, authentik could be tricked into processing the wrong part of a SAML login message. An attacker could insert a malicious, unsigned user identity claim before the legitimate, signed one. Due to the flaw, authentik would incorrectly use the attacker’s claim, granting them unauthorized access.
Potential Impact
The impact of this vulnerability is severe (CVSS: 8.8 - HIGH). A successful exploit would allow an attacker to:
- Impersonate any user within the identity provider, including administrators.
- Gain unauthorized access to all applications and systems that rely on the vulnerable authentik instance for authentication.
- Potentially steal sensitive data, perform actions as another user, or move laterally through a network.
Any authentik deployment using SAML Sources with the described configuration is at risk.
Remediation and Mitigation
Immediate action is required to secure affected systems.
Primary Remediation: The issue is fixed in the following authentik versions:
- Version 2025.8.6
- Version 2025.12.4
- Version 2025.10.4
Action Steps:
- Upgrade Immediately: Update your authentik installation to one of the patched versions listed above. This is the only complete solution.
- Review SAML Source Configuration: If an immediate upgrade is not possible, audit all SAML Sources. Ensure that both “Verify Assertion Signature” and “Verify Response Signature” are enabled. Additionally, confirm that an “Encryption Certificate” is properly configured in the Advanced Protocol settings. This configuration change will mitigate the vulnerability until an upgrade can be performed.
- Monitor for Suspicious Activity: Review authentication logs for any unusual login patterns or successes from unexpected locations, as exploitation may leave traces.
You should plan and execute the upgrade to a patched version as your highest priority to fully resolve this security risk.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
ApostropheCMS is an open-source content management framework. Prior to version 4.28.0, the bearer token authentication middleware in `@apostrophecms/express/index.js` (lines 386-389) contains an incor...
An authentication bypass vulnerability in Network Service allows unauthorized access to protected resources...
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the standalone live stream control endpoint at `plugin/Live/standAloneFiles/control.json.php` accepts a user-supplie...
A security flaw has been discovered in MacCMS 2025.1000.4052. This affects an unknown part of the file application/api/controller/Timming.php of the component Timming API Endpoint. The manipulation re...