OAuth2 Proxy Auth Bypass Critical Vulnerability (CVE-2026-34457)

OAuth2 Proxy Auth Bypass Critical Vulnerability (CVE-2026-34457)

The National Vulnerability Database (NVD) has flagged CVE-2026-34457, a critical authentication bypass vulnerability impacting OAuth2 Proxy versions prior to 7.15.2. OAuth2 Proxy, a popular reverse proxy for OAuth2-based authentication, is susceptible to this flaw under specific deployment conditions. This isn’t a blanket vulnerability, which is key. It specifically targets setups where OAuth2 Proxy is integrated using an auth_request-style mechanism, like with nginx’s auth_request module, and either --ping-user-agent is set or --gcp-healthchecks is enabled.

In these configurations, an unauthenticated remote attacker can exploit the proxy’s health check logic. The NVD reports that the affected versions treat any request bearing the configured health check User-Agent value as a legitimate health check, regardless of the requested path. This effectively bypasses authentication, granting unauthorized access to protected upstream resources. The NVD assigns this a CVSS score of 9.1 (CRITICAL), underscoring the severity of unauthenticated access to sensitive systems. Deployments that don’t meet these specific auth_request or health check flag criteria are not affected. The fix is available in version 7.15.2.

Related ATT&CK Techniques

🛡️ Detection Rules

6 rules · 5 SIEM formats

6 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.

high T1190 Initial Access

Web Application Exploitation Attempt — CVE-2026-34457

Sigma Splunk SPL Sentinel KQL Elastic QRadar AQL

Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.

6 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get Detection Rules →

Indicators of Compromise

IDTypeIndicator
CVE-2026-34457 Auth Bypass OAuth2 Proxy versions prior to 7.15.2
CVE-2026-34457 Auth Bypass OAuth2 Proxy with auth_request-style integration (e.g., nginx auth_request)
CVE-2026-34457 Auth Bypass OAuth2 Proxy with --ping-user-agent set
CVE-2026-34457 Auth Bypass OAuth2 Proxy with --gcp-healthchecks enabled
CVE-2026-34457 Auth Bypass Bypass authentication by sending a request with the configured health check User-Agent value

Related Posts

Critical RCE Flaw Hits NuGet Gallery Backend

CVE-2026-39399 — NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-20cwe-22
/CRITICAL /⚑ 4 IOCs

BoidCMS LFI to RCE: A Critical Template Flaw

CVE-2026-39387 — BoidCMS is an open-source, PHP-based flat-file CMS for building simple websites and blogs, using JSON as its database. Versions prior to 2.1.3 are...

vulnerabilityCVEhigh-severityremote-code-executioncwe-98
/HIGH /⚑ 4 IOCs

Nanobot AI: WebSocket Hijack Puts WhatsApp Sessions at Risk

CVE-2026-35589 — nanobot is a personal AI assistant. Versions prior to 0.1.5 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability exists in the bridge's WebSocket server...

vulnerabilityCVEhigh-severitycwe-1385
/HIGH /⚑ 5 IOCs