Improper access control in authentik - CVE-2024-23647
Published: January 30, 2024 / Updated: April 23, 2026
authentik
Authentik Security Inc
Description
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the PKCE implementation. A remote attacker can bypass implemented security restrictions and perform a PKCE downgrade attack on the system.