Show filters
8 Total Results
Displaying 1-8 of 8
Sort by:
Attacker Value
Unknown
CVE-2024-31253
Disclosure Date: April 10, 2024 (last updated April 11, 2024)
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in WP OAuth Server OAuth Server.This issue affects OAuth Server: from n/a through 4.3.3.
0
Attacker Value
Unknown
CVE-2022-4148
Disclosure Date: March 20, 2023 (last updated October 08, 2023)
The WP OAuth Server (OAuth Authentication) WordPress plugin before 4.3.0 has a flawed CSRF and authorisation check when deleting a client, which could allow any authenticated users, such as subscriber to delete arbitrary client.
0
Attacker Value
Unknown
CVE-2022-3894
Disclosure Date: March 20, 2023 (last updated October 08, 2023)
The WP OAuth Server (OAuth Authentication) WordPress plugin before 4.2.5 does not have CSRF check when deleting a client, and does not ensure that the object to be deleted is actually a client, which could allow attackers to make a logged in admin delete arbitrary client and post via a CSRF attack.
0
Attacker Value
Unknown
CVE-2022-3926
Disclosure Date: December 05, 2022 (last updated October 08, 2023)
The WP OAuth Server (OAuth Authentication) WordPress plugin before 3.4.2 does not have CSRF check when regenerating secrets, which could allow attackers to make logged in admins regenerate the secret of an arbitrary client given they know the client ID
0
Attacker Value
Unknown
CVE-2022-3892
Disclosure Date: December 05, 2022 (last updated October 08, 2023)
The WP OAuth Server (OAuth Authentication) WordPress plugin before 4.2.2 does not sanitize and escape Client IDs, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
0
Attacker Value
Unknown
CVE-2022-34149
Disclosure Date: August 02, 2022 (last updated September 17, 2024)
Authentication Bypass vulnerability in miniOrange WP OAuth Server plugin <= 3.0.4 at WordPress.
0
Attacker Value
Unknown
CVE-2020-26877
Disclosure Date: June 29, 2022 (last updated October 07, 2023)
ApiFest OAuth 2.0 Server 0.3.1 does not validate the redirect URI in accordance with RFC 6749 and is susceptible to an open redirector attack. Specifically, it directly sends an authorization code to the redirect URI submitted with the authorization request, without checking whether the redirect URI is registered by the client who initiated the request. This allows an attacker to craft a request with a manipulated redirect URI (redirect_uri parameter), which is under the attacker's control, and consequently obtain the leaked authorization code when the server redirects the client to the manipulated redirect URI with an authorization code. NOTE: this is similar to CVE-2019-3778.
0
Attacker Value
Unknown
CVE-2015-9435
Disclosure Date: September 26, 2019 (last updated November 27, 2024)
The oauth2-provider plugin before 3.1.5 for WordPress has incorrect generation of random numbers.
0