{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T16:27:14.948","vulnerabilities":[{"cve":{"id":"CVE-2026-32245","sourceIdentifier":"security-advisories@github.com","published":"2026-03-12T19:16:19.413","lastModified":"2026-03-19T20:46:39.793","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Tinyauth is an authentication and authorization server. Prior to 5.0.3, the OIDC token endpoint does not verify that the client exchanging an authorization code is the same client the code was issued to. A malicious OIDC client operator can exchange another client's authorization code using their own client credentials, obtaining tokens for users who never authorized their application. This violates RFC 6749 Section 4.1.3. This vulnerability is fixed in 5.0.3."},{"lang":"es","value":"Tinyauth es un servidor de autenticación y autorización. Anterior a la 5.0.3, el endpoint de token OIDC no verifica que el cliente que intercambia un código de autorización sea el mismo cliente al que se le emitió el código. Un operador de cliente OIDC malicioso puede intercambiar el código de autorización de otro cliente usando sus propias credenciales de cliente, obteniendo tokens para usuarios que nunca autorizaron su aplicación. Esto viola la Sección 4.1.3 del RFC 6749. Esta vulnerabilidad se corrige en la 5.0.3."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.3,"impactScore":4.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":4.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-863"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tinyauth:tinyauth:*:*:*:*:*:*:*:*","versionEndIncluding":"5.0.2","matchCriteriaId":"937C7D56-16AC-4536-B16E-D9057C5971DE"}]}]}],"references":[{"url":"https://github.com/steveiliop56/tinyauth/commit/b2a1bfb1f532e87f205fa3afa3fc9f148c53ab89","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/steveiliop56/tinyauth/releases/tag/v5.0.3","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/steveiliop56/tinyauth/security/advisories/GHSA-xg2q-62g2-cvcm","source":"security-advisories@github.com","tags":["Exploit","Third Party Advisory"]}]}}]}