Show filters
8 Total Results
Displaying 1-8 of 8
Sort by:
Attacker Value
Unknown

CVE-2024-31253

Disclosure Date: April 10, 2024 (last updated April 11, 2024)
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in WP OAuth Server OAuth Server.This issue affects OAuth Server: from n/a through 4.3.3.
0
Attacker Value
Unknown

CVE-2022-4148

Disclosure Date: March 20, 2023 (last updated October 08, 2023)
The WP OAuth Server (OAuth Authentication) WordPress plugin before 4.3.0 has a flawed CSRF and authorisation check when deleting a client, which could allow any authenticated users, such as subscriber to delete arbitrary client.
Attacker Value
Unknown

CVE-2022-3894

Disclosure Date: March 20, 2023 (last updated October 08, 2023)
The WP OAuth Server (OAuth Authentication) WordPress plugin before 4.2.5 does not have CSRF check when deleting a client, and does not ensure that the object to be deleted is actually a client, which could allow attackers to make a logged in admin delete arbitrary client and post via a CSRF attack.
Attacker Value
Unknown

CVE-2022-3926

Disclosure Date: December 05, 2022 (last updated October 08, 2023)
The WP OAuth Server (OAuth Authentication) WordPress plugin before 3.4.2 does not have CSRF check when regenerating secrets, which could allow attackers to make logged in admins regenerate the secret of an arbitrary client given they know the client ID
Attacker Value
Unknown

CVE-2022-3892

Disclosure Date: December 05, 2022 (last updated October 08, 2023)
The WP OAuth Server (OAuth Authentication) WordPress plugin before 4.2.2 does not sanitize and escape Client IDs, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Attacker Value
Unknown

CVE-2022-34149

Disclosure Date: August 02, 2022 (last updated September 17, 2024)
Authentication Bypass vulnerability in miniOrange WP OAuth Server plugin <= 3.0.4 at WordPress.
Attacker Value
Unknown

CVE-2020-26877

Disclosure Date: June 29, 2022 (last updated October 07, 2023)
ApiFest OAuth 2.0 Server 0.3.1 does not validate the redirect URI in accordance with RFC 6749 and is susceptible to an open redirector attack. Specifically, it directly sends an authorization code to the redirect URI submitted with the authorization request, without checking whether the redirect URI is registered by the client who initiated the request. This allows an attacker to craft a request with a manipulated redirect URI (redirect_uri parameter), which is under the attacker's control, and consequently obtain the leaked authorization code when the server redirects the client to the manipulated redirect URI with an authorization code. NOTE: this is similar to CVE-2019-3778.
Attacker Value
Unknown

CVE-2015-9435

Disclosure Date: September 26, 2019 (last updated November 27, 2024)
The oauth2-provider plugin before 3.1.5 for WordPress has incorrect generation of random numbers.