Skip to content
Threat Feed

Tag

Authorization

21 briefs RSS
high advisory

Kirby CMS Missing Authorization Vulnerability

A missing authorization vulnerability in Kirby CMS allows authenticated users to bypass intended access restrictions on pages and files, potentially leading to unauthorized information disclosure and content modification; patched in versions 4.9.0 and 5.4.0.

cms +3 authorization web-application
2r 2t
high advisory

Clerk Authorization Bypass Vulnerability

Clerk has an authorization bypass vulnerability in multiple packages where the `has()` and `auth.protect()` predicates can incorrectly return true, potentially allowing unauthorized actions.

@clerk/shared +16 authorization bypass clerk cve-2026-42349
2r 1t
medium advisory

Admidio SAML Signature Validation Bypass Allows Forged AuthnRequests and LogoutRequests

Admidio's SAML Identity Provider implementation fails to properly validate signatures on SAML AuthnRequests and LogoutRequests, enabling attackers to bypass signature enforcement, potentially disclose user attributes via forged SSO requests, and terminate user sessions via forged SLO requests.

admidio saml signature-bypass authentication authorization web-application
2r 5t
medium advisory

vanna-ai vanna Improper Authorization Vulnerability (CVE-2026-6977)

An improper authorization vulnerability (CVE-2026-6977) exists in vanna-ai vanna up to version 2.0.2 due to manipulation of an unknown function within the Legacy Flask API, potentially allowing remote attackers to bypass intended access restrictions.

vanna vulnerability authorization web application
2r 1t 1c
medium advisory

FreeScout Incorrect Authorization Vulnerability via Save Draft

FreeScout before 1.8.215 has an incorrect authorization vulnerability where a direct POST request to the `save_draft` AJAX path can create a draft inside a hidden conversation when `APP_SHOW_ONLY_ASSIGNED_CONVERSATIONS` is enabled, potentially allowing unauthorized access or modification of data.

cve authorization web application
2r 1t 1c 4i
medium advisory

FreeScout Incorrect Authorization Vulnerability (CVE-2026-41189)

FreeScout versions before 1.8.215 are vulnerable to an incorrect authorization issue where users without conversation access can edit customer threads due to a flaw in the `ThreadPolicy::edit()` function.

freescout authorization vulnerability
2r 1t 1c 4i
high advisory

Better Auth OAuth Provider Authorization Bypass Vulnerability

An authorization bypass vulnerability exists in Better Auth's OAuth provider, allowing low-privilege users to create OAuth clients despite configured clientPrivileges, potentially leading to unauthorized client registration and increased phishing risks.

oauth authorization bypass privilege-escalation defense-evasion
2r 2t
high advisory

Vault Token Leak via Authorization Header Forwarding

Vault instances configured to pass through the 'Authorization' header may forward Vault tokens to auth plugin backends when the header is used for authentication, potentially leading to token compromise; this vulnerability is tracked as CVE-2026-4525 and patched in versions 2.0.0, 1.21.5, 1.20.10, and 1.19.16.

vault token-leak authorization cve-2026-4525
2r 1t 1c 1i
critical advisory

Juju CloudSpec API Authorization Bypass (CVE-2026-5412)

CVE-2026-5412 describes an authorization issue in Juju versions prior to 2.9.57 and 3.6.21, where a low-privileged authenticated user can call the CloudSpec API method to extract cloud credentials used to bootstrap the controller, leading to sensitive credential exposure.

vulnerability authorization cloud
2r 1t 1c 1i
high advisory

Unauthenticated Access to kcp Cache Server

The kcp cache server is exposed without authentication, allowing unauthorized read access to sensitive data and a race condition for write access that could lead to temporary privilege escalation.

kcp kubernetes cache authentication authorization privilege-escalation
2r 2t
high advisory

fast-jwt Library Vulnerability Allows crit Header Validation Bypass

The fast-jwt library fails to validate the 'crit' header, allowing attackers to bypass security policies and potentially achieve split-brain verification in mixed-library environments.

jwt vulnerability authentication authorization
2r 1t 1c
medium advisory

Keycloak Redirect URI Bypass Vulnerability (CVE-2026-3872)

CVE-2026-3872 is a vulnerability in Keycloak that allows an attacker controlling a path on the same web server to bypass URI redirect validation using a wildcard, potentially leading to access token theft and information disclosure.

keycloak redirect-uri-bypass cve-2026-3872 authentication authorization
2r 1t 1c 1i
high advisory

Keycloak Authorization Code Forging Vulnerability (CVE-2026-4282)

An unauthenticated attacker can exploit CVE-2026-4282 in Keycloak's SingleUseObjectProvider to forge authorization codes, leading to privilege escalation and the creation of admin-capable access tokens.

keycloak privilege-escalation authorization
2r 1t 1c
high advisory

GitLab Jira Connect Authentication Bypass Vulnerability (CVE-2026-2370)

GitLab CE/EE versions 14.3 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 are vulnerable to improper authorization checks in Jira Connect installations, allowing an authenticated user with minimal workspace permissions to obtain installation credentials and impersonate the GitLab application.

gitlab jira authentication authorization cve-2026-2370
2r 2t 1i
high advisory

OpenClaw Gateway Plugin Subagent Admin Scope Vulnerability

The openclaw package versions 2026.3.24 and earlier are vulnerable due to the gateway plugin subagent fallback `deleteSession` function dispatching `sessions.delete` with a synthetic `operator.admin` runtime scope, potentially leading to unauthorized session deletion.

openclaw vulnerability authorization
2r 1t
high advisory

OpenClaw Session Sandbox Escape Vulnerability (CVE-2026-32918)

OpenClaw before 2026.3.11 contains a session sandbox escape vulnerability in the session_status tool, allowing sandboxed subagents to access and modify session data outside their intended scope.

openclaw sandbox-escape authorization
2r 1t
high advisory

Moby Authorization Plugin Bypass via Oversized Request Bodies

A vulnerability in Moby allows attackers to bypass authorization plugins by crafting API requests with oversized bodies, causing the Docker daemon to forward the request without the body to the plugin, potentially leading to unauthorized actions.

docker authz authorization bypass cve-2026-34040
2r
high advisory

Unscoped API Keys in AI Agent Frameworks

A research report auditing popular AI agent projects found that 93% rely on unscoped API keys as the only authentication mechanism, leading to potential credential exposure, privilege escalation, and lateral movement within multi-agent systems.

ai-agent api-key authorization credential-theft
2r 1t 2i
high advisory

Argo Workflows ConfigMap Sync Service Missing Authorization Vulnerability

The Sync Service's ConfigMap-backed provider in Argo Workflows performs zero authorization checks on all CRUD operations, allowing any authenticated user to create, read, update, and delete Kubernetes ConfigMaps containing synchronization limits, potentially leading to denial of service, workflow disruption, information disclosure, or arbitrary ConfigMap manipulation in Argo Workflows versions v4.0.0 to v4.0.4.

argo-workflows/v4 argo-workflows kubernetes configmap authorization vulnerability
2r 1t
high advisory

Kirby CMS Missing Authorization Vulnerability

Kirby CMS versions before 4.9.0 and between 5.0.0 and 5.3.3 contain a missing authorization vulnerability, allowing authenticated Panel users to access site model, user, and role information without proper permission checks, potentially leading to unauthorized information disclosure.

cms +1 authorization privilege-escalation web-application
3r 1t
medium advisory

ChatGPTNextWeb NextChat Improper Authorization Vulnerability (CVE-2026-7644)

CVE-2026-7644 is an improper authorization vulnerability in the addMcpServer function of ChatGPTNextWeb NextChat version 2.16.1 and earlier, allowing for potential remote exploitation following public disclosure of the exploit.

NextChat authorization cve-2026-7644 web-application
1r 1t 1c