LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-33496

CVE-2026-33496 - Vulnerability Analysis

HighCVSS: 8.1

Last Updated: March 26, 2026

ORY Oathkeeper - Authentication Bypass

Published: March 26, 2026Updated: March 26, 2026Remote Exploitable

Overview

ORY Oathkeeper < 26.2.0 contains an authentication bypass caused by cache key confusion in oauth2_introspection authenticator, letting attackers with a valid token bypass authentication for different introspection servers, exploit requires multiple configured introspection servers and caching enabled.

Severity & Score

Severity: High
CVSS Score: 8.1

Impact

Attackers with a valid token can bypass authentication for different introspection servers, potentially gaining unauthorized access.

Mitigation

Update to version 26.2.0 or later, or disable caching for oauth2_introspection authenticators.

Details

CVE ID
CVE-2026-33496
Severity
High
CVSS Score
8.1
Type
broken_authentication
Status
new

CWE

  • CWE-305

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N