CVE-2025-29928

8.0 HIGH

📋 TL;DR

authentik versions prior to 2024.12.4 and 2025.2.3 have a session management vulnerability when configured with database session storage. Attackers with existing sessions could maintain access even after administrators delete their sessions, potentially leading to unauthorized access. Only deployments using non-default database session storage are affected.

💻 Affected Systems

Products:
  • authentik
Versions: All versions prior to 2024.12.4 and 2025.2.3
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Only affects deployments configured to use database session storage (non-default setting). Default cache-based session storage is not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers maintain persistent access to authentik and downstream applications despite session revocation attempts, potentially leading to complete account takeover and privilege escalation.

🟠

Likely Case

Users who should have been logged out retain access to authentik and connected services, bypassing intended session termination.

🟢

If Mitigated

With cache-based session storage (default) or patched versions, sessions are properly revoked when deleted.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires existing session and database session storage configuration. Attackers need to maintain session after administrator attempts to revoke it.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.12.4 or 2025.2.3

Vendor Advisory: https://github.com/goauthentik/authentik/security/advisories/GHSA-p6p8-f853-9g2p

Restart Required: No

Instructions:

1. Upgrade authentik to version 2024.12.4 or 2025.2.3. 2. Verify session deletion now properly revokes access. 3. No restart required for session storage changes.

🔧 Temporary Workarounds

Switch to cache-based session storage

all

Change session storage from database to cache (default configuration) which properly handles session revocation

Update authentik configuration to use cache session backend instead of database session backend

🧯 If You Can't Patch

  • Switch to cache-based session storage immediately (this will invalidate all existing sessions)
  • Implement additional session monitoring and manual session termination procedures

🔍 How to Verify

Check if Vulnerable:

Check if authentik version is below 2024.12.4 or 2025.2.3 AND configured with database session storage

Check Version:

Check authentik version in admin interface or via API endpoint

Verify Fix Applied:

After upgrade, test session deletion via web interface or API and verify session is properly revoked

📡 Detection & Monitoring

Log Indicators:

  • Failed session revocation attempts
  • Sessions persisting after deletion events
  • Unexpected session activity

Network Indicators:

  • Session tokens continuing to work after supposed revocation

SIEM Query:

authentik logs showing session deletion events followed by successful authentication with same session

🔗 References

📤 Share & Export