CVE-2026-34454
Description
OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 providers. A regression introduced in 7.11.0 prevents OAuth2 Proxy from clearing the session cookie when rendering the sign-in page. In deployments that rely on the sign-in page as part of their logout flow, a user may be shown the sign-in page while the existing session cookie remains valid, meaning the browser session is not actually logged out. On shared workstations or devices, a subsequent user could continue to use the previous user's authenticated session. Deployments that use a dedicated logout/sign-out endpoint to terminate sessions are not affected. This issue is fixed in 7.15.2
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/oauth2-proxy/oauth2-proxy/v7Go | >= 7.11.0, < 7.15.2 | 7.15.2 |
Affected products
1- cpe:2.3:a:oauth2_proxy_project:oauth2_proxy:*:*:*:*:*:*:*:*Range: >=7.11.0,<7.15.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-f24x-5g9q-753fghsaADVISORY
- github.com/oauth2-proxy/oauth2-proxy/releases/tag/v7.15.2nvdVendor AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2026-34454ghsaADVISORY
- github.com/oauth2-proxy/oauth2-proxy/pull/2605ghsaWEB
- github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-f24x-5g9q-753fnvdRelease NotesWEB
News mentions
0No linked articles in our index yet.