OAuth2 Proxy Bypass: Fragment Handling Exposes Protected Resources

OAuth2 Proxy Bypass: Fragment Handling Exposes Protected Resources

The National Vulnerability Database has detailed CVE-2026-41059, a high-severity authentication bypass in OAuth2 Proxy affecting versions 7.5.0 through 7.15.1. This vulnerability allows unauthenticated attackers to access protected resources by manipulating request paths with a number sign (#) or its encoded form (%23). The issue arises when specific skip_auth_routes or skip_auth_regex configurations are in use, particularly those with broad wildcards, and upstream applications interpret # as a fragment delimiter, effectively routing the request to a protected base path.

Attackers can craft requests that match a public allowlist rule in OAuth2 Proxy while the backend application serves content from a normally protected path. Deployments are vulnerable if they utilize configuration patterns like ^/foo/.*/bar$ which can be widened by attacker-controlled suffixes, potentially exposing sensitive paths like /foo/secret. Organizations not using these skip-auth options or those with tightly scoped, exact path rules are not affected.

Version 7.15.2 includes a fix that normalizes request paths more conservatively, preventing fragment content from influencing allowlist decisions. For those unable to upgrade immediately, the National Vulnerability Database recommends tightening or removing broad skip_auth_routes and skip_auth_regex rules. Implement exact, anchored public paths with explicit HTTP methods. Additionally, rejecting requests containing %23 or # at ingress, load balancer, or WAF levels can mitigate exposure. Avoid placing sensitive application paths behind overly broad skip_auth_routes rules.

What This Means For You

  • If your organization uses OAuth2 Proxy with `skip_auth_routes` or `skip_auth_regex` and broad wildcard patterns, you are at risk. Immediately check your OAuth2 Proxy version; if it's between 7.5.0 and 7.15.1, you need to upgrade to 7.15.2. If an immediate upgrade isn't possible, audit and tighten your `skip_auth_routes` and `skip_auth_regex` configurations to use exact paths and explicit methods. Consider implementing ingress-level filtering for requests containing '#' or '%23' in the path.

Related ATT&CK Techniques

🛡️ Detection Rules

5 rules · 6 SIEM formats

5 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

Web Application Exploitation Attempt — CVE-2026-41059

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Export via Bot →

Indicators of Compromise

IDTypeIndicator
CVE-2026-41059 Auth Bypass OAuth2 Proxy versions 7.5.0 through 7.15.1
CVE-2026-41059 Auth Bypass OAuth2 Proxy configuration using `skip_auth_routes` or `skip_auth_regex` with patterns like `^/foo/.*/bar$`
CVE-2026-41059 Auth Bypass Crafted request containing '#' or '%23' in the path to bypass OAuth2 Proxy authentication
CVE-2026-41059 Auth Bypass Vulnerable component: OAuth2 Proxy path normalization before skip-auth matching
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 22, 2026 at 03:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

CVE-2026-41127 — BigBlueButton is an open-source virtual classroom. Versions

CVE-2026-41127 — BigBlueButton is an open-source virtual classroom. Versions prior to 3.0.24 have a missing authorization that allows viewers to inject/overwrite captions Version 3.0.24 tightened...

vulnerabilityCVEmedium-severitycwe-639
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 2 IOCs /⚙ 1 Sigma

CVE-2026-41126 — Open Redirect

CVE-2026-41126 — BigBlueButton is an open-source virtual classroom. Versions prior to 3.0.24 have an Open Redirect through bigbluebutton/api/join via get-parameter "logoutURL." Version 3.0.24 has adjusted...

vulnerabilityCVEmedium-severityopen-redirectcwe-601
/SCW Vulnerability Desk /MEDIUM /4.3 /⚑ 2 IOCs /⚙ 2 Sigma

Critical RCE in WWBN AVideo: Incomplete Patch Leaves Open Source Platform Exposed

CVE-2026-41064 — WWBN AVideo is an open source video platform. In versions up to and including 29.0, an incomplete fix for AVideo's `test.php` adds `escapeshellarg`...

vulnerabilityCVEcriticalhigh-severitycwe-78
/SCW Vulnerability Desk /CRITICAL /9.3 /⚑ 4 IOCs /⚙ 3 Sigma