CVE-2026-28512
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to redirect a user's authentication code to a malicious site if they can trick the user into clicking on a specially crafted link. It affects versions of the Pocket ID software before 2.4.0, so users should upgrade to the latest version to protect against this risk.
Technical Description
Pocket ID is an OIDC provider that allows users to authenticate with their passkeys to your services. From 2.0.0 to before 2.4.0, a flaw in callback URL validation allowed crafted redirect_uri values containing URL userinfo (@) to bypass legitimate callback pattern checks. If an attacker can trick a user into opening a malicious authorization link, the authorization code may be redirected to an attacker-controlled host. This vulnerability is fixed in 2.4.0.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 10, 2026
28 days ago
Last Modified
Mar 13, 2026
25 days ago
Vendor
pocket-id
Product
pocket id