Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-54576

CVE-2025-54576: OAuth2 Proxy Auth Bypass Vulnerability

CVE-2025-54576 is an authentication bypass flaw in OAuth2 Proxy affecting versions 7.10.0 and below. Attackers can exploit regex patterns in skip_auth_routes to gain unauthorized access. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: March 11, 2026

CVE-2025-54576 Overview

OAuth2-Proxy is an open-source tool that can act as either a standalone reverse proxy or a middleware component integrated into existing reverse proxy or load balancer setups. In versions 7.10.0 and below, oauth2-proxy deployments are vulnerable when using the skip_auth_routes configuration option with regex patterns. Attackers can bypass authentication by crafting URLs with query parameters that satisfy configured regex patterns, allowing unauthorized access to protected resources.

The issue stems from skip_auth_routes matching against the full request URI rather than just the path component. Deployments using skip_auth_routes with regex patterns containing wildcards or broad matching patterns are most at risk. This vulnerability is classified as CWE-290 (Authentication Bypass by Spoofing).

Critical Impact

Attackers can completely bypass OAuth2 authentication controls by manipulating URL query parameters, potentially gaining unauthorized access to protected resources and sensitive data in affected deployments.

Affected Products

  • OAuth2-Proxy versions 7.10.0 and below
  • oauth2_proxy_project oauth2_proxy
  • Deployments using skip_auth_routes with regex patterns containing wildcards or broad matching patterns

Discovery Timeline

  • 2025-07-30 - CVE CVE-2025-54576 published to NVD
  • 2025-09-10 - Last updated in NVD database

Technical Details for CVE-2025-54576

Vulnerability Analysis

This Authentication Bypass vulnerability exists in how OAuth2-Proxy processes the skip_auth_routes configuration option. When administrators configure regex patterns to skip authentication for specific routes (such as health check endpoints or public assets), the matching logic incorrectly operates against the full request URI, including query parameters.

This design flaw allows attackers to append carefully crafted query parameters to authenticated endpoints. If the resulting full URI matches any configured skip_auth_routes pattern, the proxy bypasses authentication entirely, granting access to protected resources without valid credentials.

The vulnerability is particularly dangerous because many common configurations use permissive patterns like .*\.js$ or /public/.* that can be easily exploited through query string manipulation. The network-accessible nature of OAuth2-Proxy deployments means remote attackers can exploit this without any prior authentication.

Root Cause

The root cause lies in the skip_auth_routes regex matching implementation within the OAuth2-Proxy codebase. As documented in the vulnerable source code, the matching function evaluates patterns against the complete request URI rather than isolating the path component.

The utility functions responsible for URI processing do not strip or sanitize query parameters before regex evaluation, enabling the bypass condition when attackers include path-like strings within query parameter values.

Attack Vector

The attack leverages network access to the OAuth2-Proxy endpoint. An attacker identifies protected resources behind the proxy and examines or guesses the skip_auth_routes configuration patterns. By appending query parameters that cause the full URI to match an allowlisted pattern, the attacker can access protected endpoints without authentication.

For example, if the configuration includes a pattern like ^/health.*, an attacker could access /admin/dashboard?x=/health and potentially bypass authentication if the regex matches the full URI. Alternatively, patterns like .*\.css$ could be exploited by requesting /api/sensitive?file=style.css.

The attack requires no authentication, no user interaction, and can be executed remotely with low complexity. While the vulnerability does not directly impact system availability, it allows complete compromise of confidentiality and integrity of protected resources.

Detection Methods for CVE-2025-54576

Indicators of Compromise

  • Unusual query parameters appended to protected endpoints that contain path-like strings or file extensions
  • Access log entries showing successful requests to protected resources without corresponding authentication events
  • Requests to authenticated endpoints with query strings containing patterns matching skip_auth_routes configurations
  • Anomalous user agent strings or request patterns targeting multiple endpoints with similar query parameter structures

Detection Strategies

  • Review OAuth2-Proxy access logs for requests to protected endpoints that include suspicious query parameters containing path fragments or file extensions
  • Implement Web Application Firewall (WAF) rules to detect query parameters containing patterns commonly used in skip_auth_routes configurations
  • Deploy anomaly detection to identify requests that successfully access protected resources without prior authentication flows
  • Monitor for enumeration attempts where attackers systematically test various query parameter patterns against protected endpoints

Monitoring Recommendations

  • Enable verbose logging in OAuth2-Proxy to capture full request URIs including query parameters for forensic analysis
  • Implement SIEM correlation rules to detect successful access to protected resources that bypass normal authentication patterns
  • Configure alerting for unusual ratios of authenticated versus unauthenticated successful requests to protected endpoints
  • Audit skip_auth_routes configurations periodically and log any changes to these critical security settings

How to Mitigate CVE-2025-54576

Immediate Actions Required

  • Upgrade OAuth2-Proxy to version 7.11.0 immediately as this version contains the security fix
  • Audit all existing skip_auth_routes configurations for overly permissive regex patterns
  • Review access logs for evidence of exploitation attempts targeting the authentication bypass
  • Implement additional authentication controls at the upstream application level as defense in depth

Patch Information

The vulnerability is fixed in OAuth2-Proxy version 7.11.0. The fix is available in commit 9ffafad4b2d2f9f7668e5504565f356a7c047b77 and the release can be obtained from the v7.11.0 release tag. Organizations should prioritize this upgrade given the critical severity and network-exploitable nature of the vulnerability.

For detailed information about the fix, refer to the GitHub Security Advisory GHSA-7rh7-c77v-6434.

Workarounds

  • Replace wildcard patterns with exact path matches where possible (e.g., use ^/health$ instead of /health.*)
  • Ensure all regex patterns are properly anchored by starting with ^ and ending with $ to prevent partial matching
  • Implement custom validation at the upstream application or reverse proxy layer that strips query parameters before security decisions
  • Consider temporarily removing skip_auth_routes configurations for sensitive deployments until the upgrade can be completed
bash
# Configuration hardening example for oauth2-proxy
# Replace overly permissive patterns with anchored exact matches

# BEFORE (vulnerable):
# skip_auth_routes = ["/health.*", ".*\.js$"]

# AFTER (hardened):
# Use exact path matching with proper anchoring
skip_auth_routes = ["^/health$", "^/healthz$", "^/static/.*\\.js$"]

# Verify no query parameter bypasses are possible by testing:
# curl -v "https://proxy.example.com/protected?x=/health"
# Should return 401/403, not 200

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechOauth2 Proxy

  • SeverityCRITICAL

  • CVSS Score9.1

  • EPSS Probability0.23%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-290
  • Technical References
  • GitHub Source Code Line

  • GitHub Source Code Line

  • GitHub Release Tag v7.11.0

  • OAuth2 Proxy Configuration Overview
  • Vendor Resources
  • GitHub Commit Overview

  • GitHub Security Advisory GHSA-7rh7-c77v-6434
  • Related CVEs
  • CVE-2026-40574: OAuth2 Proxy Auth Bypass Vulnerability

  • CVE-2026-41059: OAuth2 Proxy Auth Bypass Vulnerability

  • CVE-2026-40575: OAuth2 Proxy Auth Bypass Vulnerability

  • CVE-2026-34457: OAuth2 Proxy Authentication Bypass Issue
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English