authentik is an open-source identity provider. Versions prior to 2022.11.2 and 2022.10.2 are vulnerable to unauthorized user creation and potential account takeover. With the default flows, unauthenticated users can create new accounts in authentik. If a flow exists that allows for email-verified password recovery, this can be used to overwrite the email address of admin accounts and take over their accounts. authentik 2022.11.2 and 2022.10.2 fix this issue. As a workaround, a policy can be created and bound to the `default-user-settings-flow flow` with the contents `return request.user.is_authenticated`.
History

Wed, 23 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2022-12-02T17:12:42.046Z

Updated: 2025-04-23T16:33:01.881Z

Reserved: 2022-11-28T17:27:19.995Z

Link: CVE-2022-46145

cve-icon Vulnrichment

Updated: 2024-08-03T14:24:03.299Z

cve-icon NVD

Status : Modified

Published: 2022-12-02T18:15:12.790

Modified: 2024-11-21T07:30:11.823

Link: CVE-2022-46145

cve-icon Redhat

No data.