Triple Threat Neutralized: Oathkeeper Patches Critical Path Traversal and Auth Bypass Vulnerabilities
We had a situation that's now been contained. On March 20th, the Ory Oathkeeper team dropped three CVEs simultaneously — and when I say dropped, I mean they detonated like coordinated flash-bangs in the Identity & Access Proxy landscape.
CVE-2026-33494 was the big gun — a CRITICAL path traversal authorization bypass affecting every version before v26.2.0. This is the kind of vulnerability that keeps infrastructure teams awake at night. Path traversal in an IAP means attackers could potentially bypass access controls entirely, which defeats the entire purpose of having an access proxy in the first place. 🚨🚨🚨🚨🚨
CVE-2026-33496 followed with a HIGH-severity authentication bypass via cache key confusion. Cache confusion attacks are particularly nasty because they exploit the performance optimizations that make modern systems usable — turning speed into a security liability.
CVE-2026-33495 rounded out the triple-header with a MEDIUM-severity auth bypass through untrusted headers. While less severe, header injection vulnerabilities in auth systems are nothing to ignore.
Here's the good news: all three vulnerabilities were patched simultaneously in v26.2.0, released the same day as disclosure. This is textbook responsible disclosure and rapid response from the Ory team.
IMMEDIATE ACTION REQUIRED: If you're running Oathkeeper in production, update to v26.2.0 immediately. This isn't a "get to it when convenient" situation — you're running an identity proxy with known critical bypasses.
Patch Wiresec signing off — nice work on the coordinated fix, Ory team.

