CVE-2025-52553

9.6 CRITICAL

📋 TL;DR

This vulnerability in authentik allows session hijacking through Remote Access Control (RAC) tokens. An attacker who obtains a RAC token URL (e.g., via screenshare) can use it to access the same session without proper session validation. This affects all authentik deployments using RAC endpoints prior to patched versions.

💻 Affected Systems

Products:
  • authentik
Versions: All versions prior to 2025.6.3 and 2025.4.3
Operating Systems: All platforms running authentik
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments using RAC (Remote Access Control) functionality. Standard authentication flows are not impacted.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of authenticated sessions, allowing attackers to impersonate legitimate users and access sensitive systems or data through the identity provider.

🟠

Likely Case

Session hijacking during screenshares or when URLs are exposed, leading to unauthorized access to RAC-connected resources.

🟢

If Mitigated

Limited to token replay within very short windows if workarounds are applied, with proper session validation preventing unauthorized access.

🌐 Internet-Facing: HIGH - RAC endpoints accessible from the internet expose sessions to potential hijacking from any location.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could still exploit this via screenshare or URL capture scenarios.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires obtaining a valid RAC token URL, which can occur through screenshare viewing, log exposure, or network interception. No special tools needed beyond URL access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.6.3 or 2025.4.3

Vendor Advisory: https://github.com/goauthentik/authentik/security/advisories/GHSA-wr3v-9p2c-chx7

Restart Required: Yes

Instructions:

1. Backup your authentik configuration and database. 2. Update authentik to version 2025.6.3 or 2025.4.3 using your deployment method (Docker, Kubernetes, etc.). 3. Restart all authentik services. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Reduce RAC Token Validity

all

Decrease the connection expiry time for RAC tokens to limit the window for exploitation.

In authentik admin interface: Navigate to RAC Provider settings > Set Connection expiry to 'minutes=5' or lower

Enable Delete Authorization on Disconnect

all

Automatically revoke authorization when connections are terminated.

In authentik admin interface: Enable 'Delete authorization on disconnect' option in RAC Provider settings

🧯 If You Can't Patch

  • Implement the workarounds: reduce token expiry to minimum and enable delete on disconnect
  • Disable RAC functionality entirely if not required for operations

🔍 How to Verify

Check if Vulnerable:

Check authentik version: if running any version before 2025.6.3 or 2025.4.3 AND RAC is enabled, the system is vulnerable.

Check Version:

docker exec authentik authentik version (for Docker deployments) or check deployment manifests for version tags

Verify Fix Applied:

Confirm authentik version is 2025.6.3 or 2025.4.3 or later, and test that RAC tokens now properly validate user sessions.

📡 Detection & Monitoring

Log Indicators:

  • Multiple RAC connections from different IPs using same token
  • RAC token usage after user session expiration

Network Indicators:

  • Unusual RAC endpoint access patterns
  • RAC token reuse across different source IPs

SIEM Query:

source="authentik" AND "RAC" AND (token_reuse OR session_mismatch)

🔗 References

📤 Share & Export