OAuth/SAML Vulnerability in authentik Identity Provider
CVE-2025-53942

7.1HIGH

Key Information:

Status
Vendor
CVE Published:
23 July 2025

What is CVE-2025-53942?

The authentik Identity Provider, known for its flexibility and support of various protocols, has a vulnerability affecting users who have been deactivated but still maintain partial access to certain functionalities. Users who registered through OAuth or SAML or linked their accounts to these providers can experience a state where they are unable to access the API but can authorize applications, thus posing a security risk. To resolve this issue, it is recommended that developers implement an expression policy during the login stage that verifies the user's active status, effectively preventing unauthorized access. This vulnerability has been addressed in later versions, specifically 2025.6.4.

Affected Version(s)

authentik <= 2025.4.3, < 2025.4.4 < 2025.4.3, 2025.4.4

authentik >= 2025.6.0-rc1, < 2025.6.4 < 2025.6.0-rc1, 2025.6.4

References

CVSS V4

Score:
7.1
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-53942 : OAuth/SAML Vulnerability in authentik Identity Provider