Dismissed
Permalink
CVE-2026-28512
7.1 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): LOW
- Availability impact (A): NONE
by @mweinelt Activity log
- Created automatic suggestion
- @mweinelt dismissed
Pocket ID: OAuth redirect_uri validation bypass via userinfo/host confusion
Pocket ID is an OIDC provider that allows users to authenticate with their passkeys to your services. From 2.0.0 to before 2.4.0, a flaw in callback URL validation allowed crafted redirect_uri values containing URL userinfo (@) to bypass legitimate callback pattern checks. If an attacker can trick a user into opening a malicious authorization link, the authorization code may be redirected to an attacker-controlled host. This vulnerability is fixed in 2.4.0.
References
Affected products
pocket-id
- ==>= 2.0.0, < 2.4.0
Package maintainers
-
@marcusramberg Marcus Ramberg <marcus@means.no>
-
@gepbird Gutyina Gergő <gutyina.gergo.2@gmail.com>
-
@ymstnt ymstnt