<Vulnerability name="CVE-2026-41425">
    <DocumentDistribution xml:lang="en">Copyright © 2012 Red Hat, Inc. All rights reserved.</DocumentDistribution>
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2026-04-24T19:14:37</PublicDate>
    <Bugzilla id="2461690" url="https://bugzilla.redhat.com/show_bug.cgi?id=2461690" xml:lang="en:us">
authlib: Authlib: Cross-Site Request Forgery (CSRF) vulnerability in OAuth cache feature
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>5.4</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-807</CWE>
    <Details xml:lang="en:us" source="Red Hat">
A flaw was found in Authlib, a Python library for building OAuth and OpenID Connect servers. A remote attacker could exploit a missing Cross-Site Request Forgery (CSRF) protection on the cache feature within `authlib.integrations.starlette_client.OAuth`. This vulnerability allows an attacker to trick an authenticated user into performing unintended actions, potentially leading to unauthorized information disclosure or data manipulation.
    </Details>
    <Mitigation xml:lang="en:us">
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
    </Mitigation>
    <PackageState cpe="cpe:/a:redhat:migration_toolkit_applications:8">
        <ProductName>Migration Toolkit for Applications 8</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>mta/mta-solution-server-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:ansible_automation_platform:2">
        <ProductName>Red Hat Ansible Automation Platform 2</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>ansible-automation-platform-26/lightspeed-chatbot-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:quay:3">
        <ProductName>Red Hat Quay 3</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>quay/quay-rhel8</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:quay:3">
        <ProductName>Red Hat Quay 3</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>quay/quay-rhel9</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:satellite:6">
        <ProductName>Red Hat Satellite 6</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>satellite/foreman-mcp-server-rhel9</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2026-41425
https://nvd.nist.gov/vuln/detail/CVE-2026-41425
https://github.com/authlib/authlib/security/advisories/GHSA-jj8c-mmj3-mmgv
    </References>
</Vulnerability>