Untriaged
Permalink
CVE-2026-32246
8.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): HIGH
- Availability impact (A): NONE
Tinyauth vulnerable to TOTP/2FA bypass via OIDC authorize endpoint
Tinyauth is an authentication and authorization server. Prior to 5.0.3, the OIDC authorization endpoint allows users with a TOTP-pending session (password verified, TOTP not yet completed) to obtain authorization codes. An attacker who knows a user's password but not their TOTP secret can obtain valid OIDC tokens, completely bypassing the second factor. This vulnerability is fixed in 5.0.3.
References
-
https://github.com/steveiliop56/tinyauth/security/advisories/GHSA-3q28-qjrv-qr39 x_refsource_CONFIRM
Affected products
tinyauth
- ==< 5.0.3
Package maintainers
-
@shaunren Shaun Ren