Логотип exploitDog
bind:CVE-2025-68481
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-68481

Количество 2

Количество 2

nvd логотип

CVE-2025-68481

около 2 месяцев назад

FastAPI Users allows users to quickly add a registration and authentication system to their FastAPI project. Prior to version 15.0.2, the OAuth login state tokens are completely stateless and carry no per-request entropy or any data that could link them to the session that initiated the OAuth flow. `generate_state_token()` is always called with an empty `state_data` dict, so the resulting JWT only contains the fixed audience claim plus an expiration timestamp. On callback, the library merely checks that the JWT verifies under `state_secret` and is unexpired; there is no attempt to match the state value to the browser that initiated the OAuth request, no correlation cookie, and no server-side cache. Any attacker can hit `/authorize`, capture the server-generated state, finish the upstream OAuth flow with their own provider account, and then trick a victim into loading `.../callback?code=<attacker_code>&state=<attacker_state>`. Because the state JWT is valid for any client for \~1 hour,

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-5j53-63w8-8625

около 2 месяцев назад

FastAPI Users Vulnerable to 1-click Account Takeover in Apps Using FastAPI SSO

CVSS3: 5.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-68481

FastAPI Users allows users to quickly add a registration and authentication system to their FastAPI project. Prior to version 15.0.2, the OAuth login state tokens are completely stateless and carry no per-request entropy or any data that could link them to the session that initiated the OAuth flow. `generate_state_token()` is always called with an empty `state_data` dict, so the resulting JWT only contains the fixed audience claim plus an expiration timestamp. On callback, the library merely checks that the JWT verifies under `state_secret` and is unexpired; there is no attempt to match the state value to the browser that initiated the OAuth request, no correlation cookie, and no server-side cache. Any attacker can hit `/authorize`, capture the server-generated state, finish the upstream OAuth flow with their own provider account, and then trick a victim into loading `.../callback?code=<attacker_code>&state=<attacker_state>`. Because the state JWT is valid for any client for \~1 hour,

CVSS3: 5.9
0%
Низкий
около 2 месяцев назад
github логотип
GHSA-5j53-63w8-8625

FastAPI Users Vulnerable to 1-click Account Takeover in Apps Using FastAPI SSO

CVSS3: 5.9
0%
Низкий
около 2 месяцев назад

Уязвимостей на страницу