Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 16 April 2026

RSS

927 vulnerabilities published on 16 April 2026

Severity:
webpki: Name constraints for URI names were incorrectly accepted
RUSTSEC-2026-0098 GHSA-965h-392x-2mh5
Name constraints for URI names were ignored and therefore accepted. Note this library does not provide an API for asserting URI names, and URI name constraints are otherwise not implemented. URI nam...
2.2
OpenClaw: Local File Tampering Through Script Preflight
GHSA-gj9q-8w99-mp8j
Some versions of OpenClaw, a script tool, allowed a local attacker to tamper with a script file between the time it was checked for safety and the time it was read. This could cause the tool to analyz...
2.1
Ruby Zlib Interface Fails to Ensure Safe Data Storage
CVE-2026-27820 GHSA-g857-hhfv-j68w
A flaw in the Ruby Zlib interface can cause data to be stored in an incorrect location, potentially leading to memory corruption. This issue affects users of the affected versions who decompress data ...
1.7
Unauthorized Access to authentik Applications via OAuth2 Device Code Flow
BIT-authentik-2024-38371 CVE-2024-38371 GHSA-jq3m-37m7-gp45
Using the OAuth2 Device code flow in authentik, an attacker could access authorized applications without the correct permissions. This is a security risk for businesses that rely on authentik as their...
Unauthorized access to github.com/goauthentik/authentik admin account
BIT-authentik-2024-37905 CVE-2024-37905 GHSA-c78c-2r9w-p7x4
A bug in the login system of authentik, an identity management tool, allows an attacker to gain full access to the system. This means they could potentially reset passwords, make changes, and access s...
Authentik OpenID Connect Can Be Tricked into Running Malicious Code
BIT-authentik-2024-21637 CVE-2024-21637 GHSA-rjpr-7w8c-gv3j
Authentik's Identity Provider software has a security weakness that could let attackers trick users into running malicious code. This could lead to unauthorized access to sensitive information or acti...
Authentik OAuth2 flow can be bypassed without a code verifier
BIT-authentik-2023-48228 CVE-2023-48228 GHSA-fm34-v8xq-f2c3
An older version of Authentik, an identity provider, had a security weakness that allowed attackers to bypass a security check in its OAuth2 flow. This means that users who had previously used the old...
Authentik Default Admin User Password Can Be Changed by Attackers
BIT-authentik-2023-46249 CVE-2023-46249 GHSA-rjvp-29xq-f62w
If the default admin user in Authentik is deleted, an attacker can change the admin password without a password. To fix this, ensure the default admin user 'akadmin' exists and has a strong, secure pa...
Authentik Fails to Verify IP Address Headers
BIT-authentik-2023-36456 CVE-2023-36456 GHSA-cmxp-jcw7-jjjv
Authentik, an open-source Identity Provider, doesn't properly check IP address headers from users behind a reverse proxy. This can lead to fake IP addresses being logged, bypassing security checks, an...
Admins can reset any user's password via email link
BIT-authentik-2023-26481 CVE-2023-26481 GHSA-3xf5-pqvf-rqq3
If an attacker gets a password reset link from an admin, they can set any password for any user's account. To fix this, update to version 2023.2.3, 2023.1.3, or 2022.12.2 of authentik. Alternatively, ...
authentik: Users Can Create New Accounts Without Permission
BIT-authentik-2022-46172 CVE-2022-46172 GHSA-hv8r-6w7p-mpc5
A flaw in older versions of authentik allows authenticated users to create new accounts without permission. This could lead to unauthorized access and compromised security. To fix this issue, update t...
Older Versions of authentik Allow Unauthorized User Creation
BIT-authentik-2022-46145 CVE-2022-46145 GHSA-mjfw-54m5-fvjf
Versions of authentik before 2022.11.2 and 2022.10.2 allow anyone to create new accounts without authentication. This could be used to take over admin accounts if email-verified password recovery is e...
Authentik Invitation Tokens Can Be Reused Across Different Flows
BIT-authentik-2022-23555 CVE-2022-23555 GHSA-9qwp-jf7p-vr7h
Certain versions of Authentik's invitation system can be exploited if an attacker knows the different invitation flow names. This can lead to unauthorized access to accounts. To protect against this, ...
CGA-mwpp-hm8c-cc42
CGA-mwpp-hm8c-cc42
CGA-mwpp-hm8c-cc42
CGA-jpm8-7crh-f6j9
CGA-jpm8-7crh-f6j9
CGA-cpjm-2ff8-j79f
CGA-cpjm-2ff8-j79f
CGA-cwfm-5m84-fpxh
CGA-cwfm-5m84-fpxh
CGA-cwfm-5m84-fpxh
CGA-95f5-6c2p-xx72
CGA-95f5-6c2p-xx72
CGA-xv36-79hh-mj43
CGA-xv36-79hh-mj43
CGA-xv36-79hh-mj43
CGA-rq3p-f23p-6v4w
CGA-rq3p-f23p-6v4w
CGA-rq3p-f23p-6v4w
CGA-gcm2-xrr7-rg87