CVE-2026-0650: OpenFlagr contains an authentication bypass vulnerability in the HTTP middleware
OpenFlagr versions prior to and including 1.1.18 contain an authentication bypass vulnerability in the HTTP middleware. Due to improper handling of path normalization in the whitelist logic, crafted requests can bypass authentication and access protected API endpoints without valid credentials. Unauthorized access may allow modification of feature flags and export of sensitive data.
References
- dreyand.rs/code%20review/golang/2026/01/03/0day-speedrun-openflagr-less-1118-authentication-bypass
- github.com/advisories/GHSA-rwp9-5g7q-73q3
- github.com/openflagr/flagr
- github.com/openflagr/flagr/commit/fe83dc87aa404a57554aa5839ac450f55c203570
- github.com/openflagr/flagr/releases/tag/1.1.19
- nvd.nist.gov/vuln/detail/CVE-2026-0650
- www.vulncheck.com/advisories/openflagr-authentication-bypass-via-prefix-whitelist-path-normalization
Code Behaviors & Features
Detect and mitigate CVE-2026-0650 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →