<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Openvpn-Auth-Oauth2 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/openvpn-auth-oauth2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 14:29:22 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/openvpn-auth-oauth2/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenVPN-auth-oauth2 Authentication Bypass in Plugin Mode</title><link>https://feed.craftedsignal.io/briefs/2026-04-openvpn-auth-bypass/</link><pubDate>Wed, 22 Apr 2026 14:29:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openvpn-auth-bypass/</guid><description>A critical authentication bypass vulnerability exists in openvpn-auth-oauth2 versions 1.26.3 through 1.27.2 when deployed in the experimental plugin mode; clients that do not support WebAuth/SSO are incorrectly granted VPN access without completing OIDC authentication.</description><content:encoded><![CDATA[<p>OpenVPN-auth-oauth2, a plugin for OpenVPN, is susceptible to an authentication bypass vulnerability in versions 1.26.3 through 1.27.2 when deployed in the experimental plugin mode. This flaw allows unauthenticated VPN access for clients that do not support WebAuth/SSO. Specifically, standard OpenVPN clients like the Linux CLI <code>openvpn</code>, which do not advertise WebAuth/SSO support (<code>IV_SSO=webauth</code>), can bypass OIDC authentication and gain full network access. The default management-interface mode is not affected. Successful exploitation grants unauthorized access to the internal network behind the VPN. This vulnerability is addressed in version 1.27.3.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an OpenVPN server running openvpn-auth-oauth2 in experimental plugin mode (versions 1.26.3 - 1.27.2).</li>
<li>Attacker uses a standard OpenVPN client (e.g., Linux <code>openvpn</code> CLI) that does not support WebAuth/SSO.</li>
<li>The client initiates a connection to the OpenVPN server, bypassing the expected WebAuth/SSO flow.</li>
<li>The openvpn-auth-oauth2 plugin attempts to deny the client by writing &ldquo;0&rdquo; to the <code>auth_control_file</code>.</li>
<li>The plugin incorrectly returns <code>OPENVPN_PLUGIN_FUNC_SUCCESS</code> to the OpenVPN server.</li>
<li>OpenVPN interprets the <code>FUNC_SUCCESS</code> return code as successful authentication, ignoring the &ldquo;0&rdquo; in the <code>auth_control_file</code>.</li>
<li>The OpenVPN server grants the unauthenticated client full access to the internal network behind the VPN.</li>
<li>Attacker gains unauthorized access to internal resources and performs malicious activities such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants unauthenticated attackers full access to the internal network behind the OpenVPN server. This could lead to data breaches, lateral movement within the network, and potential compromise of sensitive systems. The vulnerability affects any deployment using the experimental plugin mode with vulnerable versions. This could result in significant financial losses, reputational damage, and legal repercussions for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade to openvpn-auth-oauth2 version 1.27.3 to apply the fix described in commit <a href="https://github.com/jkroepke/openvpn-auth-oauth2/commit/36f69a6c67c1054da7cbfa04ced3f0555127c8f2"><code>36f69a6</code></a>.</li>
<li>If immediate upgrade is not feasible, switch to the standalone management client mode (the default, non-plugin deployment) as a workaround.</li>
<li>Monitor OpenVPN server logs for connection attempts from clients that do not support WebAuth/SSO (identified by missing <code>IV_SSO=webauth</code> in the logs) and correlate with network access activity.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>openvpn</category><category>authentication-bypass</category><category>vpn</category></item></channel></rss>