authentik is an open-source Identity Provider. Prior to versions 2025.8.5 and 2025.10.2, when authenticating with client_id and client_secret to an OAuth provider, authentik creates a service account for the provider. In previous authentik versions, authentication for this account was possible even when the account was deactivated. Other permissions are correctly applied and federation with other providers still take assigned policies correctly into account. authentik versions 2025.8.5 and 2025.10.2 fix this issue. A workaround involves adding a policy to the application that explicitly checks if the service account is still valid, and deny access if not.
References
| Link | Resource |
|---|---|
| https://github.com/goauthentik/authentik/commit/9dbdfc3f1be0f1be36f8efce2442897b2a54a71c | Patch |
| https://github.com/goauthentik/authentik/security/advisories/GHSA-xr73-jq5p-ch8r | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2025, 18:56
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Goauthentik
Goauthentik authentik |
|
| References | () https://github.com/goauthentik/authentik/commit/9dbdfc3f1be0f1be36f8efce2442897b2a54a71c - Patch | |
| References | () https://github.com/goauthentik/authentik/security/advisories/GHSA-xr73-jq5p-ch8r - Patch, Third Party Advisory | |
| CPE | cpe:2.3:a:goauthentik:authentik:*:*:*:*:*:*:*:* |
19 Nov 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-19 17:15
Updated : 2025-11-20 18:56
NVD link : CVE-2025-64521
Mitre link : CVE-2025-64521
CVE.ORG link : CVE-2025-64521
JSON object : View
Products Affected
goauthentik
- authentik
CWE
CWE-289
Authentication Bypass by Alternate Name
