Cybersecurity Forecast 2026: What to Expect – New Report

CVE-2025-54576

Critical OAuth2-Proxy authentication bypass via crafted URIs

Vulnerability Overview

CVE ID: CVE-2025-54576

CVE Title: OAuth2-Proxy authentication bypass via skip_auth_routes matching full URI

Severity: Critical

Exploit Status: Public proof-of-concept (PoC) and scanner detections exist; reports of active exploitation are mixed

Business Risk: Unauthorized access to protected endpoints, exposure of sensitive data, and potential unauthorized modification of upstream resources (confidentiality & integrity impacts rated high).

Summary

CVE-2025-54576 is a critical logic/validation flaw in oauth2-proxy (versions up through 7.10.0) tied to how skip_auth_routes regexes are evaluated. Instead of matching only the request path, configured regex rules were applied against the entire request URI (path plus query string). An attacker can append crafted query parameters so that a protected endpoint’s request URI satisfies a skip rule and authentication is bypassed. The project fixed the issue in v7.11.0.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2025-54576?

Technical Overview

How Does the CVE-2025-54576 Exploit Work?

The attack typically follows these steps:

CVE-2025-54576 Exploitation Process

What Causes CVE-2025-54576?

Vulnerability Root Cause:

The issue comes from how skip_auth_routes regexes are checked. The code matched the full request URI, including both the path and the query string, instead of only the path. This means an attacker could add query parameters that match a skip rule and trick oauth2-proxy into skipping authentication for protected endpoints. The matching logic was fixed in version 7.11.0.

How Can You Mitigate CVE-2025-54576?

If immediate patching is delayed or not possible:

  • Strip query strings before route-matching. Perform path-only matching at the proxy or a pre-processing layer so skip_auth_routes never sees query parameters.
  • Temporarily remove or tighten skip_auth_routes entries. Disable any rules that use broad wildcards until they can be reviewed.
  • Replace wildcard rules with explicit paths and anchor patterns with ^ and $ so they match only intended endpoints.
  • Add upstream validation to reject requests with unexpected path-like values in query parameters. Backends should not accept requests where query values look like other protected paths.
  • Deploy WAF / IDS/SIEM rules to flag requests whose query strings contain path-like values that match your skip patterns (hunt for ?param=/… or similar).
  • Review request logs and auth logs for instances where a protected path was served while a query parameter contained a path fragment; treat these as high-priority alerts.

Which Assets and Systems Are at Risk?

Asset Types Affected:

Business-Critical Systems at Risk:

Exposure Level:

Will Patching CVE-2025-54576 Cause Downtime?

Patch application impact: Low. Upgrade OAuth2-Proxy to v7.11.0. Redeployments usually cause minimal downtime if using CI/CD or containers.

Mitigation (if immediate patching is not possible): Audit skip_auth_routes, avoid wildcards, anchor regex, or strip query parameters before matching. Partial risk reduction only; full patch needed to secure endpoints.

How Can You Detect CVE-2025-54576 Exploitation?

Exploitation Signatures:

Indicators of Compromise (IOCs/IOAs):

Behavioral Indicators:

CVSS Breakdown Table

MetricValue Description
Base Score9.1Critical severity, indicating high risk due to authentication bypass
Attack VectorNetworkExploitable remotely over HTTP/HTTPS without physical access
Attack ComplexityLowDoes not require special conditions; straightforward exploitation
Privileges RequiredNoneNo authentication or elevated privileges needed
User Interaction NoneExploit does not require any user action
Scope UnChanged Only affects the vulnerable oauth2-proxy component
Confidentiality Impact HighExploit can give unauthorized access to sensitive data or protected endpoints
Integrity ImpactHighxploit can allow bypassing authentication controls and accessing restricted resources
Availability ImpactNoneNo direct impact on system availability reported

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.