OAuth2 Proxy Bypass: Fragment Handling Exposes Protected Resources
The National Vulnerability Database has detailed CVE-2026-41059, a high-severity authentication bypass in OAuth2 Proxy affecting versions 7.5.0 through 7.15.1. This vulnerability allows unauthenticated attackers to access protected resources by manipulating request paths with a number sign (#) or its encoded form (%23). The issue arises when specific skip_auth_routes or skip_auth_regex configurations are in use, particularly those with broad wildcards, and upstream applications interpret # as a fragment delimiter, effectively routing the request to a protected base path.
Attackers can craft requests that match a public allowlist rule in OAuth2 Proxy while the backend application serves content from a normally protected path. Deployments are vulnerable if they utilize configuration patterns like ^/foo/.*/bar$ which can be widened by attacker-controlled suffixes, potentially exposing sensitive paths like /foo/secret. Organizations not using these skip-auth options or those with tightly scoped, exact path rules are not affected.
Version 7.15.2 includes a fix that normalizes request paths more conservatively, preventing fragment content from influencing allowlist decisions. For those unable to upgrade immediately, the National Vulnerability Database recommends tightening or removing broad skip_auth_routes and skip_auth_regex rules. Implement exact, anchored public paths with explicit HTTP methods. Additionally, rejecting requests containing %23 or # at ingress, load balancer, or WAF levels can mitigate exposure. Avoid placing sensitive application paths behind overly broad skip_auth_routes rules.
What This Means For You
- If your organization uses OAuth2 Proxy with `skip_auth_routes` or `skip_auth_regex` and broad wildcard patterns, you are at risk. Immediately check your OAuth2 Proxy version; if it's between 7.5.0 and 7.15.1, you need to upgrade to 7.15.2. If an immediate upgrade isn't possible, audit and tighten your `skip_auth_routes` and `skip_auth_regex` configurations to use exact paths and explicit methods. Consider implementing ingress-level filtering for requests containing '#' or '%23' in the path.
Related ATT&CK Techniques
🛡️ Detection Rules
5 rules · 6 SIEM formats5 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Web Application Exploitation Attempt — CVE-2026-41059
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-41059 | Auth Bypass | OAuth2 Proxy versions 7.5.0 through 7.15.1 |
| CVE-2026-41059 | Auth Bypass | OAuth2 Proxy configuration using `skip_auth_routes` or `skip_auth_regex` with patterns like `^/foo/.*/bar$` |
| CVE-2026-41059 | Auth Bypass | Crafted request containing '#' or '%23' in the path to bypass OAuth2 Proxy authentication |
| CVE-2026-41059 | Auth Bypass | Vulnerable component: OAuth2 Proxy path normalization before skip-auth matching |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 22, 2026 at 03:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.