CVE-2026-3432
Plain English Summary
AI-powered analysis for quick understanding
An attacker can steal OAuth access tokens for any user by simply providing their user ID and a provider name, allowing them to access third-party services without needing to log in. This vulnerability affects versions of SimStudio below 0.5.74 and does not require any authentication, making it particularly dangerous.
Technical Description
On SimStudio version below to 0.5.74, the `/api/auth/oauth/token` endpoint contains a code path that bypasses all authorization checks when provided with `credentialAccountUserId` and `providerId` parameters. An unauthenticated attacker can retrieve OAuth access tokens for any user by supplying their user ID and a provider name, effectively stealing credentials to third-party services.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 2, 2026
about 1 month ago
Last Modified
Mar 6, 2026
about 1 month ago
Vendor
sim
Product
sim
Related Vulnerabilities
An attacker can exploit this vulnerability to connect to any accessible MongoDB database and perform unauthorized actions like reading, changing, or deleting data. This is possible because the affected version of SimStudio allows anyone to send connection requests without needing to log in or restrict which hosts can connect.
This vulnerability allows an attacker to inject malicious code into the SimStudioAI application, potentially compromising its functionality. The attack can be executed remotely, meaning the attacker doesn’t need physical access to the system, but it requires the attacker to manipulate specific input in the application.