Files
authentik/website/docs/security/cves/CVE-2026-25227.md
authentik-automation[bot] c880c9f4ab security: CVE-2026-25227 (#20239)
Co-authored-by: authentik-automation[bot] <135050075+authentik-automation[bot]@users.noreply.github.com>
2026-02-12 14:45:50 +00:00

37 lines
1.5 KiB
Markdown

# CVE-2026-25227
_Reported by [@rahulgovind](https://github.com/rahulgovind)_
## Authenticated Remote Code Execution via Policy/Property Mapping test endpoint
### Summary
When using delegated permissions, a User that has the permission **Can view \* Property Mapping** or **Can view Expression Policy** is able to execute arbitrary code within the authentik server container through the `test` endpoint, which is intended to preview how a property mapping/policy works.
### Patches
authentik 2025.8.6, 2025.10.4 and 2025.12.4 fix this issue; for other versions the workaround below can be used.
### Impact
Users with the view permissions specified above are able to execute arbitrary code that has access to the entire authentik database as well as any environment variables, allowing the user to escalate their permissions and fully take over an instance.
### Workarounds
If an upgrade is not possible, it is strongly recommended to un-assign the **Can view \* Property Mapping** and **Can view Expression Policy** permissions from any user that should not have administrative privileges, and treat them equal to the edit equivalent permissions.
It is also possible to block requests to the test endpoint, which have the following URLs:
(:uuid is a placeholder for any UUID.)
```
POST /api/v3/propertymappings/all/:uuid/test/
POST /api/v3/policies/all/:uuid/test/
```
### For more information
If you have any questions or comments about this advisory:
- Email us at [security@goauthentik.io](mailto:security@goauthentik.io).