The security flaw stems from the system’s incorrect handling of request URI matching, where the authentication bypass occurs because skip_auth_routes matches against the complete request URI (including both path and query parameters) rather than just the path component as documented. A critical security vulnerability has been identified in OAuth2-Proxy, a widely-used reverse proxy that provides authentication services for Google, Azure, OpenID Connect, and numerous other identity providers. The vulnerability, designated as CVE-2025-54576, enables attackers to bypass authentication mechanisms by manipulating query parameters in crafted URLs, potentially granting unauthorized access to protected resources. Deployments most at risk include those using skip_auth_routes with regex patterns containing wildcards or broad matching patterns, particularly when backend services ignore unknown query parameters.
This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 31 Jul 2025 08:40:22 +0000