authentik is an open-source identity provider. When using the client_credentials or device_code OAuth grants, it was possible for an attacker to get a token from authentik with scopes that haven't been configured in authentik. authentik 2024.8.5 and 2024.10.3 fix this issue.
References
Configurations
Configuration 1 (hide)
|
History
21 Aug 2025, 19:21
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:goauthentik:authentik:*:*:*:*:*:*:*:* | |
First Time |
Goauthentik
Goauthentik authentik |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
References | () https://github.com/goauthentik/authentik/commit/e9c29e1644e9199b4ba58d2b10eb8c322138eea2 - Patch | |
References | () https://github.com/goauthentik/authentik/security/advisories/GHSA-v6m7-8j37-8f4v - Vendor Advisory |
21 Nov 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-21 18:15
Updated : 2025-08-21 19:21
NVD link : CVE-2024-52287
Mitre link : CVE-2024-52287
CVE.ORG link : CVE-2024-52287
JSON object : View
Products Affected
goauthentik
- authentik
CWE
CWE-285
Improper Authorization