Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. oauthenticator
  4. ›
  5. CVE-2026-33175

CVE-2026-33175: Auth0OAuthenticator has an Authentication Bypass via Unverified Email Claims

April 3, 2026 (updated April 6, 2026)

An authentication bypass vulnerability in oauthenticator allows an attacker with an unverified email address on an Auth0 tenant to login to JupyterHub. When email is used as the usrname_claim, this gives users control over their username and the possibility of account takeover.

References

  • github.com/advisories/GHSA-rrvg-cxh4-qhrv
  • github.com/jupyterhub/oauthenticator
  • github.com/jupyterhub/oauthenticator/commit/f0c7002dc36e41efae0f674033cf7888a21d96f9
  • github.com/jupyterhub/oauthenticator/releases/tag/17.4.0
  • github.com/jupyterhub/oauthenticator/security/advisories/GHSA-rrvg-cxh4-qhrv
  • nvd.nist.gov/vuln/detail/CVE-2026-33175
  • support.auth0.com/center/s/article/Enforce-Email-Verification-With-Sending-Email-After-Each-Denied-Access

Code Behaviors & Features

Detect and mitigate CVE-2026-33175 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 17.4.0

Fixed versions

  • 17.4.0

Solution

Upgrade to version 17.4.0 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-287: Improper Authentication
  • CWE-290: Authentication Bypass by Spoofing

Source file

pypi/oauthenticator/CVE-2026-33175.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:01 +0000.