Callback URL Validation Bypass in Pocket ID OIDC Provider
CVE-2026-28512

7.1HIGH

Key Information:

Vendor

Pocket-id

Status
Vendor
CVE Published:
9 March 2026

What is CVE-2026-28512?

A security flaw in the Pocket ID OIDC provider, present in versions 2.0.0 to prior to 2.4.0, allows attackers to bypass legitimate callback URL validation. By manipulating redirect_uri parameters, an attacker can redirect authorization codes to an unauthorized host. This can occur if a user unwittingly accesses a malicious authorization link. It is crucial for users of Pocket ID to upgrade to version 2.4.0 or later to mitigate this vulnerability.

Affected Version(s)

pocket-id >= 2.0.0, < 2.4.0

References

CVSS V3.1

Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.