CVE-2026-22797

EUVD-2026-3202
An issue was discovered in OpenStack keystonemiddleware 10.5 through 10.7 before 10.7.2, 10.8 and 10.9 before 10.9.1, and 10.10 through 10.12 before 10.12.1. The external_oauth2_token middleware fails to sanitize incoming authentication headers before processing OAuth 2.0 tokens. By sending forged identity headers such as X-Is-Admin-Project, X-Roles, or X-User-Id, an authenticated attacker may escalate privileges or impersonate other users. All deployments using the external_oauth2_token middleware are affected.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
mitreCNA
9.9 CRITICAL
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
openstackkeystonemiddleware
10.5.0 ≤
𝑥
< 10.7.2
CNA
openstackkeystonemiddleware
10.8.0 ≤
𝑥
< 10.9.1
CNA
openstackkeystonemiddleware
10.10.0 ≤
𝑥
< 10.12.1
CNA
Debian logo
Debian Releases
Debian Product
Codename
python-keystonemiddleware
bookworm
10.1.0-4
fixed
bullseye
9.1.0-2
fixed
forky
12.0.0-2
fixed
sid
12.0.0-2
fixed
trixie
10.9.0-2+deb13u1
fixed
trixie (security)
10.9.0-2+deb13u1
fixed