Four Critical RCE Vulnerabilities in n8n: What Cloud Security Teams Need to Know
Automation platforms sit at the center of modern infrastructure. They connect APIs, databases, CI/CD pipelines,...
Mar 10, 2026
OAuth and OpenID Connect are the backbone of modern cloud-native identity and access management. From SaaS platforms and internal APIs to Kubernetes microservices, these protocols are responsible for verifying who is allowed to access what.
When a vulnerability appears in a widely used authentication library, the impact can cascade across entire application ecosystems.
In February 2026, a HIGH-severity vulnerability (CVE-2026-28802, CVSS 7.7) was disclosed in Authlib, a popular Python implementation of OAuth 2.0 and OpenID Connect used by many frameworks and backend services.
The issue allows a JWT signature verification bypass under certain conditions, meaning that malicious tokens may be accepted as valid by vulnerable applications.
For security teams running Python-based APIs, identity providers, or resource servers in cloud-native environments, this is not a theoretical risk. If exploited, it can allow attackers to impersonate users, escalate privileges, or bypass authentication controls entirely.
To understand CVE-2026-28802, it helps to first understand how JSON Web Tokens (JWTs) are supposed to work.
JWTs are widely used for identity and authorization in OAuth and OpenID Connect flows. They typically contain three parts:
header.payload.signature
The header defines metadata such as the signing algorithm. The payload contains claims like:
The signature ensures the token was created by a trusted issuer and has not been modified.
When a service receives a JWT, it must:
If signature verification fails, the token must be rejected.
JWT supports multiple algorithms for signing tokens. One of them is a special value:
alg: none
This value indicates no signature is present.
Historically, libraries that incorrectly accepted alg: none tokens have been vulnerable to authentication bypass attacks. An attacker can simply remove the signature and provide arbitrary claims.
For example, an attacker could craft a token like this:
{
"alg": "none",
"typ": "JWT"
}
Payload:
{
"sub": "admin",
"role": "administrator",
"iss": "trusted-idp"
}
Because the token has no signature, any application that mistakenly accepts it effectively allows the attacker to forge their own identity.
This class of vulnerability has appeared multiple times across JWT libraries over the past decade.
CVE-2026-28802 affects Authlib versions 1.6.5 through 1.6.6.
In these versions, the JWT verification logic can incorrectly accept tokens with:
alg: noneInstead of rejecting the token during verification, the validation step may succeed.
In practice, this means a malicious client can:
This results in a signature verification bypass, allowing attackers to impersonate users or elevate privileges.
Consider a typical cloud-native architecture:
An attacker could:
Example malicious claims:
sub: admin role: administrator scope: *
If the application uses a vulnerable Authlib version, the token may be accepted as valid.
The consequences can include:
In modern infrastructure, JWT tokens are rarely limited to a single application.
They often enable:
This means a verification bypass can ripple through an entire environment.
Potential impact includes:
In Kubernetes environments, this can affect multiple workloads simultaneously, particularly if shared authentication libraries are used across services.
Organizations should assess exposure if they run Python services using Authlib for authentication or token validation.
Affected environments include:
Specifically versions:
Authlib >=1.6.5 and <1.6.7
Use cases may include:
Many internal APIs rely on JWT tokens for service-to-service authentication. If these services validate tokens using Authlib, they may be exposed.
Containerized Python applications commonly bundle dependencies inside container images.
If Authlib is included in the image, the vulnerable version may be present even if the application itself is not directly using the affected functionality.
Security teams can verify the installed version in several ways.
Inspect dependency files:
Or check directly inside running containers:
pip show authlib
Container image scanning tools can also identify vulnerable packages during CI/CD or in deployed workloads.
The primary remediation is straightforward:
Upgrade to Authlib 1.6.7 or later
This version properly rejects tokens using alg: none without a valid signature.
Security teams should locate vulnerable packages in:
Useful tools include:
pip auditIf exploitation is suspected, review logs for unusual JWT characteristics such as:
"alg":"none"API gateway and authentication logs may reveal anomalies such as:
In practice, not every vulnerable package represents an active risk.
In many container images, vulnerable libraries may exist as transitive dependencies that are never actually used at runtime.
This is where runtime context becomes important for prioritization.
ARMO’s Cloud Application Detection and Response (CADR) platform can detect vulnerable packages inside running containers and determine whether the affected library is actually loaded and used by the application, or simply present in the image as an unused dependency.
This distinction helps security teams:
By combining runtime visibility with dependency analysis, teams can quickly identify which services using Authlib are actually performing JWT validation and therefore require immediate attention.
CVE-2026-28802 is a reminder that vulnerabilities in authentication libraries can have outsized security consequences.
OAuth and OpenID Connect underpin identity verification across modern infrastructure. When signature validation fails, attackers can potentially impersonate any user in the system.
Security teams should take the following steps immediately:
In cloud-native environments where identity flows through dozens of services, token validation bugs can quickly become systemic risks.
Ensuring that authentication libraries are patched—and that vulnerable dependencies are actively monitored in running workloads—is critical to maintaining trust in your identity infrastructure.
Automation platforms sit at the center of modern infrastructure. They connect APIs, databases, CI/CD pipelines,...
The ARMO-Rapid7 partnership connects broad attack surface coverage with deep cloud and Kubernetes runtime security...
A newly disclosed MongoDB vulnerability, tracked as CVE-2025-14847 and informally referred to as MongoBleed, allows...