Description
OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 providers. Prior to 7.15.2, an authorization bypass exists in OAuth2 Proxy as part of the email_domain enforcement option. An attacker may be able to authenticate with an email claim such as attacker@evil.com@company.com and satisfy an allowed domain check for company.com, even though the claim is not a valid email address. The issue ONLY affects deployments that rely on email_domain restrictions and accept email claim values from identity providers or claim mappings that do not strictly enforce normal email syntax. This vulnerability is fixed in 7.15.2.
Published: 2026-04-21
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authorization Bypass
Action: Immediate Patch
AI Analysis

Impact

A flaw in OAuth2 Proxy’s email domain enforcement allows an attacker to craft an email claim containing multiple @ characters, such as attacker@evil.com@company.com, that satisfies the allowed domain check for company.com while the claim is not a valid email address. The weakness is rooted in improper validation of email format and permits unauthorized access to resources protected by OAuth2 Proxy, potentially compromising confidentiality and integrity of the protected services. The identified weakness falls under CWE-863, representing an Authorization Bypass via Reverse Map.

Affected Systems

The vulnerability impacts deployments of OAuth2 Proxy versions earlier than 7.15.2 that utilize the email_domain restriction feature and accept email claim values from identity providers or mapping rules that do not enforce strict email syntax. All affected releases are identified by the vendor product oauth2-proxy:oauth2-proxy and must be upgraded to 7.15.2 or later.

Risk and Exploitability

The CVSS score of 6.8 indicates moderate severity, while no EPSS score is available, thus the exploitation probability is unknown but the absence of a disclosed exploit mitigates immediate risk. The vulnerability was not included in CISA’s KEV catalog. The likely attack path involves an adversary manipulating the email claim in an OAuth token to pass the domain check, granting unauthorized authorization over resources that rely solely on the email_domain filter for access control.

Generated by OpenCVE AI on April 21, 2026 at 22:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor supplied patch by upgrading OAuth2 Proxy to version 7.15.2 or later.
  • If an upgrade is not immediately possible, disable the email_domain enforcement option or enforce strict email syntax validation on all identity provider claim mappings to reject malformed claims.
  • Continuously monitor authentication logs for anomalous email claims containing multiple @ characters and review access patterns for indicators of compromise.

Generated by OpenCVE AI on April 21, 2026 at 22:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-c5c4-8r6x-56w3 OAuth2 Proxy has an Authorization Bypass in Email Domain Validation via Malformed Multi-@ Email Claims
History

Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Oauth2 Proxy Project
Oauth2 Proxy Project oauth2 Proxy
Vendors & Products Oauth2 Proxy Project
Oauth2 Proxy Project oauth2 Proxy

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 21 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Description OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 providers. Prior to 7.15.2, an authorization bypass exists in OAuth2 Proxy as part of the email_domain enforcement option. An attacker may be able to authenticate with an email claim such as attacker@evil.com@company.com and satisfy an allowed domain check for company.com, even though the claim is not a valid email address. The issue ONLY affects deployments that rely on email_domain restrictions and accept email claim values from identity providers or claim mappings that do not strictly enforce normal email syntax. This vulnerability is fixed in 7.15.2.
Title OAuth2 Proxy has an Authorization Bypass in Email Domain Validation via Malformed Multi-@ Email Claims
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Oauth2 Proxy Project Oauth2 Proxy
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-21T20:37:28.072Z

Reserved: 2026-04-14T13:24:29.474Z

Link: CVE-2026-40574

cve-icon Vulnrichment

Updated: 2026-04-21T20:20:47.257Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-21T17:16:55.730

Modified: 2026-04-22T21:24:26.997

Link: CVE-2026-40574

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T11:46:10Z

Weaknesses