Open Redirect Vulnerability in Sonos API Affects OAuth Login Process
CVE-2025-43916

3.4LOW

Key Information:

Vendor

Sonos

Vendor
CVE Published:
21 April 2025

What is CVE-2025-43916?

The Sonos API, specifically through the endpoint /login/v3/oauth, is vulnerable to an open redirect flaw that allows the inclusion of userinfo within the authority component of a redirect URI. This misconfiguration fails to adhere to established protocols outlined in RFC 6819 section 5.2.3.5, enabling the possibility for an attacker to redirect users to unauthorized destinations after authorization. This vulnerability raises concerns particularly due to indications of a hardcoded secret found during application decompilation, potentially amplifying the risks associated with unauthorized access.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

api.sonos.com 0 <= 2025-04-21

References

CVSS V3.1

Score:
3.4
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.