Impact
Ory Oathkeeper, an Identity & Access Proxy, fails to normalize URL paths when evaluating access rules. An attacker can send a request such as "/public/../admin/secrets"; after normalization the request targets a protected route, but the raw, un-normalized path is used in rule evaluation. The permissive rule matches the raw path, granting the attacker unauthorized access to the protected resource. This enables confidential data exposure and other privileged actions.
Affected Systems
The vulnerability affects Ory Oathkeeper versions prior to 26.2.0. Users running 26.2.0 or later are not affected.
Risk and Exploitability
The CVSS score is 10, indicating the highest severity, but the EPSS score is below 1%, suggesting a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. It can be exploited remotely via crafted HTTP requests and requires no special privileges or local access.
OpenCVE Enrichment
Github GHSA