CVE-2026-33496: CWE-1289: Improper Validation of Unsafe Equivalence in Input in ory oathkeeper
ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. Versions prior to 26.2.0 are vulnerable to authentication bypass due to cache key confusion. The `oauth2_introspection` authenticator cache does not distinguish tokens that were validated with different introspection URLs. An attacker can therefore legitimately use a token to prime the cache, and subsequently use the same token for rules that use a different introspection server. Ory Oathkeeper has to be configured with multiple `oauth2_introspection` authenticator servers, each accepting different tokens. The authenticators also must be configured to use caching. An attacker has to have a way to gain a valid token for one of the configured introspection servers. Starting in version 26.2.0, Ory Oathkeeper includes the introspection server URL in the cache key, preventing confusion of tokens. Update to the patched version of Ory Oathkeeper. If that is not immediately possible, disable caching for `oauth2_introspection` authenticators.
AI Analysis
Technical Summary
ORY Oathkeeper is an Identity & Access Proxy (IAP) that authorizes HTTP requests based on access rules and supports multiple oauth2_introspection authenticators configured with different introspection server URLs. Prior to version 26.2.0, the oauth2_introspection authenticator caches token validation results but uses a cache key that does not include the introspection server URL. This leads to cache key confusion where a token validated against one introspection server can be reused to satisfy authentication checks for other introspection servers. An attacker who obtains a valid token for one introspection server can prime the cache with that token, then access resources protected by rules using different introspection servers without revalidation. This effectively bypasses intended authentication boundaries between different introspection servers. The vulnerability stems from improper validation of unsafe equivalence in input (CWE-1289) and insufficient authentication checks (CWE-305). The flaw requires that caching is enabled for oauth2_introspection authenticators and that multiple introspection servers are configured. The fix in version 26.2.0 adds the introspection server URL to the cache key, preventing token reuse across different servers. If immediate upgrade is not possible, disabling caching for oauth2_introspection authenticators prevents exploitation. No known exploits are reported in the wild as of now.
Potential Impact
This vulnerability allows attackers with a valid token for one introspection server to bypass authentication controls on other introspection servers configured in the same Oathkeeper deployment. This can lead to unauthorized access to protected resources, compromising confidentiality and integrity of sensitive data and services. Organizations relying on Oathkeeper for fine-grained access control with multiple oauth2_introspection servers are at risk of privilege escalation and unauthorized resource access. The impact is significant in environments where different introspection servers represent different trust domains or client applications. Although availability is not affected, the breach of authentication boundaries can undermine trust in the identity and access management infrastructure, potentially leading to data breaches, compliance violations, and reputational damage.
Mitigation Recommendations
1. Upgrade ORY Oathkeeper to version 26.2.0 or later, which includes the fix that incorporates the introspection server URL into the cache key, eliminating cache key confusion. 2. If upgrading immediately is not feasible, disable caching for oauth2_introspection authenticators in the Oathkeeper configuration to prevent token reuse across different introspection servers. 3. Review and audit all oauth2_introspection authenticator configurations to ensure that multiple introspection servers are necessary and properly segregated. 4. Implement strict token issuance policies and monitor token usage to detect anomalous reuse patterns. 5. Employ network segmentation and access controls to limit exposure of introspection servers. 6. Regularly update and patch identity and access management components to minimize exposure to known vulnerabilities. 7. Conduct penetration testing and security assessments focusing on authentication mechanisms and caching behavior in Oathkeeper deployments.
Affected Countries
United States, Germany, Netherlands, United Kingdom, France, Canada, Australia, Japan, South Korea, India
CVE-2026-33496: CWE-1289: Improper Validation of Unsafe Equivalence in Input in ory oathkeeper
Description
ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. Versions prior to 26.2.0 are vulnerable to authentication bypass due to cache key confusion. The `oauth2_introspection` authenticator cache does not distinguish tokens that were validated with different introspection URLs. An attacker can therefore legitimately use a token to prime the cache, and subsequently use the same token for rules that use a different introspection server. Ory Oathkeeper has to be configured with multiple `oauth2_introspection` authenticator servers, each accepting different tokens. The authenticators also must be configured to use caching. An attacker has to have a way to gain a valid token for one of the configured introspection servers. Starting in version 26.2.0, Ory Oathkeeper includes the introspection server URL in the cache key, preventing confusion of tokens. Update to the patched version of Ory Oathkeeper. If that is not immediately possible, disable caching for `oauth2_introspection` authenticators.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
ORY Oathkeeper is an Identity & Access Proxy (IAP) that authorizes HTTP requests based on access rules and supports multiple oauth2_introspection authenticators configured with different introspection server URLs. Prior to version 26.2.0, the oauth2_introspection authenticator caches token validation results but uses a cache key that does not include the introspection server URL. This leads to cache key confusion where a token validated against one introspection server can be reused to satisfy authentication checks for other introspection servers. An attacker who obtains a valid token for one introspection server can prime the cache with that token, then access resources protected by rules using different introspection servers without revalidation. This effectively bypasses intended authentication boundaries between different introspection servers. The vulnerability stems from improper validation of unsafe equivalence in input (CWE-1289) and insufficient authentication checks (CWE-305). The flaw requires that caching is enabled for oauth2_introspection authenticators and that multiple introspection servers are configured. The fix in version 26.2.0 adds the introspection server URL to the cache key, preventing token reuse across different servers. If immediate upgrade is not possible, disabling caching for oauth2_introspection authenticators prevents exploitation. No known exploits are reported in the wild as of now.
Potential Impact
This vulnerability allows attackers with a valid token for one introspection server to bypass authentication controls on other introspection servers configured in the same Oathkeeper deployment. This can lead to unauthorized access to protected resources, compromising confidentiality and integrity of sensitive data and services. Organizations relying on Oathkeeper for fine-grained access control with multiple oauth2_introspection servers are at risk of privilege escalation and unauthorized resource access. The impact is significant in environments where different introspection servers represent different trust domains or client applications. Although availability is not affected, the breach of authentication boundaries can undermine trust in the identity and access management infrastructure, potentially leading to data breaches, compliance violations, and reputational damage.
Mitigation Recommendations
1. Upgrade ORY Oathkeeper to version 26.2.0 or later, which includes the fix that incorporates the introspection server URL into the cache key, eliminating cache key confusion. 2. If upgrading immediately is not feasible, disable caching for oauth2_introspection authenticators in the Oathkeeper configuration to prevent token reuse across different introspection servers. 3. Review and audit all oauth2_introspection authenticator configurations to ensure that multiple introspection servers are necessary and properly segregated. 4. Implement strict token issuance policies and monitor token usage to detect anomalous reuse patterns. 5. Employ network segmentation and access controls to limit exposure of introspection servers. 6. Regularly update and patch identity and access management components to minimize exposure to known vulnerabilities. 7. Conduct penetration testing and security assessments focusing on authentication mechanisms and caching behavior in Oathkeeper deployments.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-20T16:59:08.887Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c570d8f4197a8e3bef1f0a
Added to database: 3/26/2026, 5:46:00 PM
Last enriched: 3/26/2026, 6:00:39 PM
Last updated: 3/26/2026, 7:43:20 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.