ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. Versions prior to 26.2.0 are vulnerable to an authorization bypass via HTTP path traversal. An attacker can craft a URL containing path traversal sequences (e.g. `/public/../admin/secrets`) that resolves to a protected path after normalization, but is matched against a permissive rule because the raw, un-normalized path is used during rule evaluation. Version 26.2.0 contains a patch.
References
| Link | Resource |
|---|---|
| https://github.com/ory/oathkeeper/commit/8e0002140491c592db41fa141dc6ad68f417e2b2 | Patch |
| https://github.com/ory/oathkeeper/security/advisories/GHSA-p224-6x5r-fjpm | Mitigation Vendor Advisory |
Configurations
History
07 Apr 2026, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:ory:oathkeeper:*:*:*:*:*:*:*:* | |
| First Time |
Ory oathkeeper
Ory |
|
| References | () https://github.com/ory/oathkeeper/commit/8e0002140491c592db41fa141dc6ad68f417e2b2 - Patch | |
| References | () https://github.com/ory/oathkeeper/security/advisories/GHSA-p224-6x5r-fjpm - Mitigation, Vendor Advisory |
30 Mar 2026, 13:26
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
26 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-26 18:16
Updated : 2026-04-07 21:15
NVD link : CVE-2026-33494
Mitre link : CVE-2026-33494
CVE.ORG link : CVE-2026-33494
JSON object : View
Products Affected
ory
- oathkeeper
CWE
CWE-23
Relative Path Traversal
