Browse all 14 CVE security advisories affecting ory. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Ory provides open-source identity and access management solutions, including authentication, authorization, and user management services. Historically, the project has faced vulnerabilities across multiple classes, including remote code execution, cross-site scripting, privilege escalation, and insecure direct object references. Notable security characteristics include its cloud-native architecture and OAuth 2.0/OpenID Connect implementations. While no major public security incidents have been widely reported, the project maintains a moderate CVE count with 14 recorded vulnerabilities to date, primarily related to input validation and access control issues in its core authentication flows.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-33496 | Ory Oathkeeper has an authentication bypass by cache key confusion — oathkeeperCWE-1289 | 8.1 | High | 2026-03-26 |
| CVE-2026-33495 | Ory Oathkeeper has an authentication bypass by usage of untrusted header — oathkeeperCWE-862 | 6.5 | Medium | 2026-03-26 |
| CVE-2026-33494 | Ory Oathkeeper has a path traversal authorization bypass — oathkeeperCWE-23 | 10.0 | Critical | 2026-03-26 |
| CVE-2021-32701 | Possible bypass of token claim validation when OAuth2 Introspection caching is enabled — oathkeeperCWE-863 | 7.5 | High | 2021-06-22 |
This page lists every published CVE security advisory associated with ory. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.