The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-41671

CVE-2026-41671: Admidio OIDC Auth Bypass Vulnerability

CVE-2026-41671 is an authentication bypass flaw in Admidio's OIDC implementation that allows attackers to bypass token validation. This article covers the technical details, affected versions, and mitigation strategies.

Published: May 7, 2026

CVE-2026-41671 Overview

CVE-2026-41671 is an authentication bypass vulnerability in Admidio, an open-source user management solution. Versions prior to 5.0.9 ship a broken OpenID Connect (OIDC) token introspection endpoint at /modules/sso/index.php/oidc/introspect. The endpoint always responds with {"active": true} regardless of the token submitted. It performs no authentication of the calling resource server and no validation of the token. The companion revocation endpoint /oidc/revoke similarly returns {"revoked": true} without invalidating any token. Resource servers that depend on Admidio for token validation will accept attacker-supplied, expired, or fabricated tokens as authorized [CWE-287].

Critical Impact

Any resource server relying on Admidio's OIDC introspection accepts forged or expired tokens as valid, enabling complete authentication bypass and preventing revocation of compromised credentials.

Affected Products

  • Admidio versions prior to 5.0.9
  • Admidio OIDC token introspection endpoint (/modules/sso/index.php/oidc/introspect)
  • Admidio OIDC token revocation endpoint (/oidc/revoke)

Discovery Timeline

  • 2026-05-07 - CVE-2026-41671 published to NVD
  • 2026-05-07 - Last updated in NVD database

Technical Details for CVE-2026-41671

Vulnerability Analysis

Admidio implements an OIDC provider that exposes RFC 7662 token introspection and RFC 7009 token revocation endpoints. Resource servers call introspection to verify whether a bearer token is still active before granting access to protected resources. In affected versions, the introspection handler skips both client authentication and token verification. It unconditionally returns a JSON document with active set to true. The revocation endpoint exhibits the same defect, returning a success response without touching token state.

The practical consequence is that any downstream service trusting Admidio's introspection output treats every request as authenticated. An attacker can submit a random string, an expired token, or a token revoked by an administrator and still receive access. Because revocation also silently fails, defenders cannot disable stolen tokens through the standard OIDC flow.

Root Cause

The root cause is missing authentication logic in the OIDC endpoint handlers. The introspection route does not verify the caller's client_id and client_secret, does not look up the submitted token in storage, and does not check expiration, signature, or revocation flags. The revocation route lacks the corresponding lookup and update operations. Both endpoints return hardcoded success payloads, mapping to [CWE-287: Improper Authentication].

Attack Vector

The vulnerability is reachable over the network without prior authentication. An attacker presents any value as a bearer token to a resource server that delegates validation to a vulnerable Admidio instance. The resource server queries /modules/sso/index.php/oidc/introspect, receives {"active": true}, and authorizes the request. Exploitation requires that a third-party resource server is configured to use Admidio for OIDC token validation, which is the documented integration pattern.

No verified exploit code is published. The behavior is described in the GitHub Security Advisory GHSA-9xx5-cv6j-x533.

Detection Methods for CVE-2026-41671

Indicators of Compromise

  • HTTP requests to /modules/sso/index.php/oidc/introspect originating from unexpected source addresses or without valid client credentials in the Authorization header.
  • Successful authentication events on resource servers that correlate with introspection responses returning active: true for tokens not present in the Admidio token store.
  • Calls to /oidc/revoke followed by continued use of the supposedly revoked token against protected resources.

Detection Strategies

  • Inspect Admidio web server access logs for introspection and revocation requests, and compare submitted token values against the application's issued token database.
  • Deploy a synthetic test that submits a clearly invalid token to the introspection endpoint; a response of {"active": true\} confirms the vulnerable code path.
  • Correlate OIDC client traffic with downstream resource server authorization decisions to identify approvals based on tokens that were never issued.

Monitoring Recommendations

  • Alert on any HTTP 200 response from /oidc/introspect where the request body lacks a properly formatted JWT or opaque token from the issuer.
  • Track Admidio version strings via banner or build metadata and flag instances reporting versions earlier than 5.0.9.
  • Monitor authentication failure-to-success ratios on resource servers integrated with Admidio for sudden drops that may indicate exploitation.

How to Mitigate CVE-2026-41671

Immediate Actions Required

  • Upgrade all Admidio installations to version 5.0.9 or later, which contains the fix.
  • Until patched, disable OIDC single sign-on in Admidio or block external access to /modules/sso/index.php/oidc/introspect and /oidc/revoke at the reverse proxy.
  • Rotate OIDC client secrets and force re-issuance of all access and refresh tokens after upgrading.

Patch Information

The fix is included in Admidio 5.0.9. Release notes and source changes are available in the GitHub Release v5.0.9. The advisory describing the issue is published as GHSA-9xx5-cv6j-x533.

Workarounds

  • Configure resource servers to validate tokens locally using the issuer's signing keys and the JWT exp, iat, and aud claims rather than relying on Admidio introspection.
  • Restrict the introspection and revocation endpoints to trusted resource server IP ranges via web server access control rules.
  • Require mutual TLS or HTTP Basic authentication at the reverse proxy in front of /oidc/introspect and /oidc/revoke to limit which clients can invoke them.
bash
# Example nginx restriction for the introspection and revocation endpoints
location ~ ^/(modules/sso/index\.php/oidc/introspect|oidc/revoke)$ {
    allow 10.0.0.0/8;        # trusted resource server subnet
    deny  all;
    proxy_pass http://admidio_backend;
}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechAdmidio

  • SeverityMEDIUM

  • CVSS Score6.8

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-287
  • Technical References
  • GitHub Release v5.0.9

  • GitHub Security Advisory GHSA-9xx5-cv6j-x533
  • Related CVEs
  • CVE-2026-41670: Admidio SAML Auth Bypass Vulnerability

  • CVE-2026-41669: Admidio SAML Auth Bypass Vulnerability

  • CVE-2026-41662: Admidio Auth Bypass Vulnerability

  • CVE-2026-41658: Admidio Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English