Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/openflagr/flagr
  4. ›
  5. CVE-2026-0650

CVE-2026-0650: OpenFlagr contains an authentication bypass vulnerability in the HTTP middleware

January 7, 2026

OpenFlagr versions prior to and including 1.1.18 contain an authentication bypass vulnerability in the HTTP middleware. Due to improper handling of path normalization in the whitelist logic, crafted requests can bypass authentication and access protected API endpoints without valid credentials. Unauthorized access may allow modification of feature flags and export of sensitive data.

References

  • dreyand.rs/code%20review/golang/2026/01/03/0day-speedrun-openflagr-less-1118-authentication-bypass
  • github.com/advisories/GHSA-rwp9-5g7q-73q3
  • github.com/openflagr/flagr
  • github.com/openflagr/flagr/commit/fe83dc87aa404a57554aa5839ac450f55c203570
  • github.com/openflagr/flagr/releases/tag/1.1.19
  • nvd.nist.gov/vuln/detail/CVE-2026-0650
  • www.vulncheck.com/advisories/openflagr-authentication-bypass-via-prefix-whitelist-path-normalization

Code Behaviors & Features

Detect and mitigate CVE-2026-0650 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.0.0-20251009103504-fe83dc87aa40

Fixed versions

  • 0.0.0-20251009103504-fe83dc87aa40

Solution

Upgrade to version 0.0.0-20251009103504-fe83dc87aa40 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-306: Missing Authentication for Critical Function
  • CWE-425: Direct Request ('Forced Browsing')

Source file

go/github.com/openflagr/flagr/CVE-2026-0650.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 04 Feb 2026 00:35:26 +0000.