CVE-2022-38180
Description
In JetBrains Ktor before 2.1.0 the wrong authentication provider could be selected in some cases
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In JetBrains Ktor before 2.1.0, nested authentication providers could cause the wrong provider to be selected, potentially allowing authentication bypass.
Vulnerability
Overview CVE-2022-38180 affects JetBrains Ktor, a Kotlin framework for building connected applications. The vulnerability arises from improper handling of nested authentication providers. When multiple authentication providers are configured with nesting, the selection logic can incorrectly choose the wrong provider for a given request [1]. This flaw was introduced in versions prior to 2.1.0 and is addressed in Pull Request #3092, which fixes the nesting of authentication providers [1].
Exploitation
Prerequisites An attacker can exploit this vulnerability without authentication, as the issue lies in the server-side selection of the authentication provider. The attack surface includes any Ktor application that uses multiple authentication providers in a nested configuration. By sending a crafted request, the attacker can trigger the misrouting, causing the application to apply an unintended authentication provider [1][3].
Impact
Successful exploitation could lead to authentication bypass, where an attacker gains access to resources that should be protected by a different, possibly stronger, authentication provider. Depending on the application's security model, this could allow unauthorized access to sensitive data or functionality. The CVSS score and severity are not explicitly given, but the vulnerability is considered moderate due to the prerequisite of a specific configuration [3].
Mitigation
JetBrains fixed this issue in Ktor version 2.1.0. Users are advised to upgrade to this version or later to eliminate the vulnerability. No workarounds have been documented [1][3].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
io.ktor:ktorMaven | < 2.1.0 | 2.1.0 |
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-hccx-cg4v-hrjxghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-38180ghsaADVISORY
- github.com/ktorio/ktor/pull/3092ghsax_refsource_MISCWEB
- www.jetbrains.com/privacy-security/issues-fixedghsaWEB
- www.jetbrains.com/privacy-security/issues-fixed/mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.