<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-33175 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-33175/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 03 Apr 2026 22:16:26 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-33175/feed.xml" rel="self" type="application/rss+xml"/><item><title>OAuthenticator Authentication Bypass Vulnerability (CVE-2026-33175)</title><link>https://feed.craftedsignal.io/briefs/2026-04-oauthenticator-auth-bypass/</link><pubDate>Fri, 03 Apr 2026 22:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-oauthenticator-auth-bypass/</guid><description>OAuthenticator versions prior to 17.4.0 contain an authentication bypass vulnerability (CVE-2026-33175) that allows an attacker with an unverified email address on an Auth0 tenant to log in to JupyterHub when email is used as the username claim, potentially leading to account takeover.</description><content:encoded><![CDATA[<p>OAuthenticator is a software package that enables the integration of OAuth2 identity providers with JupyterHub. A critical authentication bypass vulnerability, identified as CVE-2026-33175, affects OAuthenticator versions prior to 17.4.0. This flaw permits an attacker with an unverified email address on an Auth0 tenant to successfully authenticate and log in to a JupyterHub instance. The vulnerability arises when email is used as the <code>username_claim</code>, granting attackers control over their username and potentially enabling account takeover. Organizations using affected versions of OAuthenticator in conjunction with Auth0 are at risk. The vulnerability was patched in version 17.4.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to an Auth0 tenant and creates an account.</li>
<li>The attacker does not verify the email address associated with the Auth0 account.</li>
<li>JupyterHub is configured to use OAuthenticator for authentication, with email specified as the <code>username_claim</code>.</li>
<li>The attacker attempts to log in to JupyterHub using the unverified Auth0 account.</li>
<li>Due to the vulnerability in OAuthenticator versions prior to 17.4.0, the authentication bypass occurs, allowing the attacker to successfully log in.</li>
<li>The attacker gains unauthorized access to the JupyterHub environment.</li>
<li>Attacker leverages the compromised account to perform malicious activities, such as accessing sensitive data or modifying Jupyter notebooks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33175 allows unauthorized access to JupyterHub instances. This can lead to the compromise of sensitive data, modification of Jupyter notebooks, and potential disruption of services. The vulnerability impacts organizations that use OAuthenticator with Auth0 and rely on email as the username claim. The number of affected organizations is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OAuthenticator to version 17.4.0 or later to patch CVE-2026-33175.</li>
<li>Review JupyterHub configurations to ensure that email is not used as the <code>username_claim</code> if possible.</li>
<li>Implement multi-factor authentication (MFA) for JupyterHub accounts to mitigate the risk of account takeover.</li>
<li>Monitor logs for suspicious login attempts from Auth0 accounts with unverified email addresses. Deploy the provided Sigma rule targeting process creation after successful authentication to detect suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication-bypass</category><category>jupyterhub</category><category>oauthenticator</category><category>cve-2026-33175</category></item></channel></rss>