CVE-2026-33496 - Vulnerability Analysis
HighCVSS: 8.1Last Updated: March 26, 2026
ORY Oathkeeper - Authentication Bypass
Overview
ORY Oathkeeper < 26.2.0 contains an authentication bypass caused by cache key confusion in oauth2_introspection authenticator, letting attackers with a valid token bypass authentication for different introspection servers, exploit requires multiple configured introspection servers and caching enabled.
Severity & Score
Impact
Attackers with a valid token can bypass authentication for different introspection servers, potentially gaining unauthorized access.
Mitigation
Update to version 26.2.0 or later, or disable caching for oauth2_introspection authenticators.
References
Social Media Activity(1 post)
š CVE-2026-33496 - High (8.1) ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. Versions prior to 26.2.0 are vulnerable to authentication bypass due to cache key confusion. The `oaut... š https://www.thehackerwire.com/vulnerability/CVE-2026-33496/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-33496
- Severity
- High
- CVSS Score
- 8.1
- Type
- broken_authentication
- Status
- new
- EPSS
- 13.8%
- Social Posts
- 1
CWE
- CWE-305
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N