Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.2
Authentik: Malicious Users Can Execute Arbitrary Code
CVE-2026-25227
BIT-authentik-2026-25227
Summary
A vulnerability in Authentik's delegated permissions allows a malicious user to execute arbitrary code on the server. This can happen when a user has permission to view property mappings or expression policies. Update Authentik to version 2025.8.6, 2025.10.4, or 2025.12.4 to fix this issue.
What to do
- Update authentik to version 2025.12.4.
Affected software
| Ecosystem | Vendor | Product | Affected versions |
|---|---|---|---|
| – | goauthentik | authentik |
>= 2021.3.1, < 2025.8.6 >= 2025.10.0, < 2025.10.4 >= 2025.12.0, < 2025.12.4 cpe:2.3:a:goauthentik:authentik:*:*:*:*:*:*:*:* |
| Bitnami | – | authentik |
>= 2025.10.0, < 2025.12.4 Fix: upgrade to 2025.12.4
|
Original title
authentik affected by Remote Code Execution via Context Key Injection in PropertyMapping Test Endpoint
Original description
authentik is an open-source identity provider. From 2021.3.1 to before 2025.8.6, 2025.10.4, and 2025.12.4, when using delegated permissions, a User that has the permission Can view * Property Mapping or Can view Expression Policy is able to execute arbitrary code within the authentik server container through the test endpoint, which is intended to preview how a property mapping/policy works. authentik 2025.8.6, 2025.10.4, and 2025.12.4 fix this issue.
nvd CVSS3.1
7.2
Vulnerability type
CWE-94
Code Injection
- https://github.com/goauthentik/authentik/commit/c691afaef164cf73c10a26a944ef2f11... Patch
- https://github.com/goauthentik/authentik/releases/tag/version%2F2025.10.4 Product Release Notes
- https://github.com/goauthentik/authentik/releases/tag/version%2F2025.12.4 Product Release Notes
- https://github.com/goauthentik/authentik/releases/tag/version%2F2025.8.6 Product Release Notes
- https://github.com/goauthentik/authentik/security/advisories/GHSA-qvxx-mfm6-626f Mitigation Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-25227 URL
Published: 16 Apr 2026 · Updated: 17 Apr 2026 · First seen: 6 Mar 2026