CVE-2026-41070: openvpn-auth-oauth2 Critical Bypass in Plugin Mode

CVE-2026-41070: openvpn-auth-oauth2 Critical Bypass in Plugin Mode

A critical authentication bypass (CVE-2026-41070) has been identified in openvpn-auth-oauth2 versions 1.26.3 through 1.27.2. The National Vulnerability Database reports that when this OpenVPN plugin is deployed in its experimental plugin mode, clients that do not support WebAuth/SSO – such as the standard OpenVPN CLI on Linux – can bypass authentication logic and gain unauthorized VPN access, even if denied by the OIDC-based SSO flow.

This vulnerability carries a CVSS score of 10.0 (CRITICAL), indicating severe impact with no authentication required for exploitation. The issue specifically affects deployments where openvpn-auth-oauth2 is loaded via the plugin directive in OpenVPN. The default management-interface mode is not affected, as it does not rely on the OpenVPN plugin’s return-code mechanism for authentication decisions.

Defenders must recognize that this isn’t a theoretical flaw; it’s a fundamental breakdown of access control. An attacker doesn’t need to guess credentials or exploit a complex chain. They just need to connect with a non-SSO client to bypass the intended security gates. The National Vulnerability Database confirms that this has been patched in version 1.27.3, making immediate upgrades non-negotiable for affected deployments.

What This Means For You

  • If your organization uses `openvpn-auth-oauth2` in plugin mode (loaded via the `plugin` directive), you are highly vulnerable to unauthorized VPN access. Immediately verify your `openvpn-auth-oauth2` version and upgrade to 1.27.3 or later. Prioritize this patch, as it's a complete authentication bypass for specific client types.

Indicators of Compromise

IDTypeIndicator
CVE-2026-41070 Auth Bypass openvpn-auth-oauth2 plugin versions 1.26.3 to before 1.27.3
CVE-2026-41070 Auth Bypass openvpn-auth-oauth2 deployed in experimental plugin mode
CVE-2026-41070 Auth Bypass Clients not supporting WebAuth/SSO (e.g., openvpn CLI on Linux) are incorrectly admitted
🔎
Critical CVEs & Vulnerability Intel Use /brief for an analyst-ready weekly threat summary with severity rankings and key IOCs.
Open Intel Bot →
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 08, 2026 at 19:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-6667 — PgBouncer before 1.25.2 did not perform an appropriate

CVE-2026-6667 — PgBouncer before 1.25.2 did not perform an appropriate authorization check for the KILL_CLIENT admin command. All users with access to the administration console...

vulnerabilityCVEmedium-severitycwe-862
/SCW Vulnerability Desk /MEDIUM /4.3 /⚑ 2 IOCs /⚙ 2 Sigma

CVE-2026-6666 — A possible null pointer reference in PgBouncer before

CVE-2026-6666 — A possible null pointer reference in PgBouncer before 1.25.2 could lead to a crash, if a server sends an error response without SQLSTATE...

vulnerabilityCVEmedium-severitycwe-476
/SCW Vulnerability Desk /MEDIUM /5.9 /⚑ 2 IOCs /⚙ 1 Sigma

PgBouncer SCRAM Vulnerability (CVE-2026-6665) Allows Stack Overflow

CVE-2026-6665 — The SCRAM code in PgBouncer before 1.25.2 did not check the return value of strlcat() correctly when building the contents of the SCRAM...

vulnerabilityCVEhigh-severitycwe-121
/SCW Vulnerability Desk /HIGH /8.1 /⚑ 4 IOCs /⚙ 2 Sigma