Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: pocket-id

Found 1 matching suggestions

View:
Compact
Detailed
Permalink CVE-2026-28512
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 week, 4 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
Pocket ID: OAuth redirect_uri validation bypass via userinfo/host confusion

Pocket ID is an OIDC provider that allows users to authenticate with their passkeys to your services. From 2.0.0 to before 2.4.0, a flaw in callback URL validation allowed crafted redirect_uri values containing URL userinfo (@) to bypass legitimate callback pattern checks. If an attacker can trick a user into opening a malicious authorization link, the authorization code may be redirected to an attacker-controlled host. This vulnerability is fixed in 2.4.0.

Affected products

pocket-id
  • ==>= 2.0.0, < 2.4.0

Matching in nixpkgs

Package maintainers

Unstable: https://github.com/NixOS/nixpkgs/pull/497928
25.11: Unaffected