CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
EPSS
Percentile
26.2%
This effectively allowed an attacker to bypass the state protection as they could just copy the expected state token from the first request to their second request.
It is recommended that the user_oidc is upgraded to 1.3.0.
No workaround available
Are there any links users can visit to find out more?