Description
RT is an open source, enterprise-grade issue and ticket tracking system. Versions 5.0.9 and prior in addition to 6.0.0 through 6.0.2 contain an authentication bypass vulnerability in RT installations that use LDAP/AD for user authentication. Under certain LDAP server configurations, an attacker may be able to authenticate as any LDAP-backed RT user without supplying valid credentials. This issue has been fixed in versions 5.0.10 and 6.0.3. If developers are unable to upgrade immediately, they can temporarily work around this issue by reviewing their LDAP server's authentication policy to ensure it rejects unauthenticated bind attempts. Upgrading RT remains the recommended fix.
Published: 2026-05-22
Score: 8.1 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An LDAP authentication bypass flaw in RT allows an attacker to authenticate as any LDAP‑backed user by supplying an empty password or exploiting certain LDAP server configurations. This flaw directly compromises user identity, enabling the attacker to assume the permissions of any affected account, thereby undermining confidentiality, integrity, and availability of the ticketing platform. The vulnerability is classified as CWE‑287, an authentication failure weakness.

Affected Systems

The issue affects bestpractical’s RT product versions 5.0.9 and earlier, as well as 6.0.0 through 6.0.2. These releases permit LDAP or AD based authentication. The flaw has been corrected in RT 5.0.10 and 6.0.3.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.1, indicating high severity. Although the EPSS score is not published, the existing exploitation vector—unauthenticated LDAP bind under specific configurations—remains a realistic attack path. The flaw is not yet listed in CISA KEV. An attacker can leverage standard LDAP interaction to obtain valid session tokens for any user, potentially escalating to full administrative control if the account privileges allow.

Generated by OpenCVE AI on May 22, 2026 at 23:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade RT to version 5.0.10 or 6.0.3, which contain the fix for the LDAP authentication bypass.
  • If an upgrade cannot be performed immediately, modify the LDAP server’s authentication policy to reject unauthenticated bind attempts or empty passwords, thereby restoring the integrity of the authentication process.
  • Validate that the new LDAP configuration is effectively rejecting empty or unauthenticated bind requests before reinstating RT user access.

Generated by OpenCVE AI on May 22, 2026 at 23:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 May 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Bestpractical
Bestpractical rt
Vendors & Products Bestpractical
Bestpractical rt

Fri, 22 May 2026 22:00:00 +0000

Type Values Removed Values Added
Description RT is an open source, enterprise-grade issue and ticket tracking system. Versions 5.0.9 and prior in addition to 6.0.0 through 6.0.2 contain an authentication bypass vulnerability in RT installations that use LDAP/AD for user authentication. Under certain LDAP server configurations, an attacker may be able to authenticate as any LDAP-backed RT user without supplying valid credentials. This issue has been fixed in versions 5.0.10 and 6.0.3. If developers are unable to upgrade immediately, they can temporarily work around this issue by reviewing their LDAP server's authentication policy to ensure it rejects unauthenticated bind attempts. Upgrading RT remains the recommended fix.
Title RT: LDAP authentication bypass via empty password
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Bestpractical Rt
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-22T21:36:21.585Z

Reserved: 2026-04-16T16:43:03.175Z

Link: CVE-2026-41076

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T23:30:03Z

Weaknesses