CVE-2026-34457
OAuth2 Proxy · OAuth2 Proxy
OAuth2 Proxy contains an authentication bypass vulnerability when integrated with Nginx auth_request, allowing unauthenticated access to protected resources.
Executive summary
A critical authentication bypass in OAuth2 Proxy allows unauthenticated remote attackers to access protected upstream resources by spoofing health check requests.
Vulnerability
The proxy incorrectly validates requests containing specific User-Agent strings, treating them as health checks regardless of the requested path when used in auth_request configurations.
Business impact
The vulnerability allows an unauthenticated attacker to bypass established authentication controls entirely. With a CVSS score of 9.1, this provides unauthorized access to sensitive upstream applications, potentially resulting in large-scale data breaches or unauthorized administrative actions.
Remediation
Immediate Action: Update OAuth2 Proxy to version 7.15.2 or later.
Proactive Monitoring: Review access logs for requests originating from unexpected IPs that utilize the health check User-Agent strings.
Compensating Controls: If immediate patching is not possible, disable the --ping-user-agent or --gcp-healthchecks features, or implement strict IP-based access control lists (ACLs) for health check endpoints.
Exploitation status
Public Exploit Available: Unknown
Analyst recommendation
This bypass is particularly dangerous because it exploits a feature intended for monitoring. Security teams must verify their deployment configuration to determine if they are using the affected auth_request integration and apply the patch as a matter of urgency to restore authentication integrity.