CVE-2026-28513

High
|7.1
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to misuse authorization codes to access services by exploiting expired codes or codes meant for different clients, as long as they have the correct client ID. It affects versions prior to 2.4.0 of Pocket ID, which means users need to update to the latest version to protect against this issue.

Technical Description

Pocket ID is an OIDC provider that allows users to authenticate with their passkeys to your services. Prior to 2.4.0, the OIDC token endpoint rejects an authorization code only when both the client ID is wrong and the code is expired. This allows cross-client code exchange and expired code reuse. This vulnerability is fixed in 2.4.0.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactLow
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References