Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 16 April 2026
RSS927 vulnerabilities published on 16 April 2026
Severity:
webpki: Name constraints for URI names were incorrectly accepted
RUSTSEC-2026-0098
GHSA-965h-392x-2mh5
Name constraints for URI names were ignored and therefore accepted.
Note this library does not provide an API for asserting URI names, and URI name constraints are otherwise not implemented. URI nam...
2.2
OpenClaw: Local File Tampering Through Script Preflight
GHSA-gj9q-8w99-mp8j
Some versions of OpenClaw, a script tool, allowed a local attacker to tamper with a script file between the time it was checked for safety and the time it was read. This could cause the tool to analyz...
2.1
Ruby Zlib Interface Fails to Ensure Safe Data Storage
CVE-2026-27820
GHSA-g857-hhfv-j68w
A flaw in the Ruby Zlib interface can cause data to be stored in an incorrect location, potentially leading to memory corruption. This issue affects users of the affected versions who decompress data ...
1.7
Unauthorized Access to authentik Applications via OAuth2 Device Code Flow
BIT-authentik-2024-38371
CVE-2024-38371
GHSA-jq3m-37m7-gp45
Using the OAuth2 Device code flow in authentik, an attacker could access authorized applications without the correct permissions. This is a security risk for businesses that rely on authentik as their...
Unauthorized access to github.com/goauthentik/authentik admin account
BIT-authentik-2024-37905
CVE-2024-37905
GHSA-c78c-2r9w-p7x4
A bug in the login system of authentik, an identity management tool, allows an attacker to gain full access to the system. This means they could potentially reset passwords, make changes, and access s...
Authentik OpenID Connect Can Be Tricked into Running Malicious Code
BIT-authentik-2024-21637
CVE-2024-21637
GHSA-rjpr-7w8c-gv3j
Authentik's Identity Provider software has a security weakness that could let attackers trick users into running malicious code. This could lead to unauthorized access to sensitive information or acti...
Authentik OAuth2 flow can be bypassed without a code verifier
BIT-authentik-2023-48228
CVE-2023-48228
GHSA-fm34-v8xq-f2c3
An older version of Authentik, an identity provider, had a security weakness that allowed attackers to bypass a security check in its OAuth2 flow. This means that users who had previously used the old...
Authentik Default Admin User Password Can Be Changed by Attackers
BIT-authentik-2023-46249
CVE-2023-46249
GHSA-rjvp-29xq-f62w
If the default admin user in Authentik is deleted, an attacker can change the admin password without a password. To fix this, ensure the default admin user 'akadmin' exists and has a strong, secure pa...
Authentik Fails to Verify IP Address Headers
BIT-authentik-2023-36456
CVE-2023-36456
GHSA-cmxp-jcw7-jjjv
Authentik, an open-source Identity Provider, doesn't properly check IP address headers from users behind a reverse proxy. This can lead to fake IP addresses being logged, bypassing security checks, an...
Admins can reset any user's password via email link
BIT-authentik-2023-26481
CVE-2023-26481
GHSA-3xf5-pqvf-rqq3
If an attacker gets a password reset link from an admin, they can set any password for any user's account. To fix this, update to version 2023.2.3, 2023.1.3, or 2022.12.2 of authentik. Alternatively, ...
authentik: Users Can Create New Accounts Without Permission
BIT-authentik-2022-46172
CVE-2022-46172
GHSA-hv8r-6w7p-mpc5
A flaw in older versions of authentik allows authenticated users to create new accounts without permission. This could lead to unauthorized access and compromised security. To fix this issue, update t...
Older Versions of authentik Allow Unauthorized User Creation
BIT-authentik-2022-46145
CVE-2022-46145
GHSA-mjfw-54m5-fvjf
Versions of authentik before 2022.11.2 and 2022.10.2 allow anyone to create new accounts without authentication. This could be used to take over admin accounts if email-verified password recovery is e...
Authentik Invitation Tokens Can Be Reused Across Different Flows
BIT-authentik-2022-23555
CVE-2022-23555
GHSA-9qwp-jf7p-vr7h
Certain versions of Authentik's invitation system can be exploited if an attacker knows the different invitation flow names. This can lead to unauthorized access to accounts. To protect against this, ...
CGA-mwpp-hm8c-cc42
CGA-mwpp-hm8c-cc42
CGA-mwpp-hm8c-cc42
CGA-jpm8-7crh-f6j9
CGA-jpm8-7crh-f6j9
CGA-cpjm-2ff8-j79f
CGA-cpjm-2ff8-j79f
CGA-cwfm-5m84-fpxh
CGA-cwfm-5m84-fpxh
CGA-cwfm-5m84-fpxh
CGA-95f5-6c2p-xx72
CGA-95f5-6c2p-xx72
CGA-xv36-79hh-mj43
CGA-xv36-79hh-mj43
CGA-xv36-79hh-mj43
CGA-rq3p-f23p-6v4w
CGA-rq3p-f23p-6v4w
CGA-rq3p-f23p-6v4w
CGA-gcm2-xrr7-rg87