The OAuth Single Sign On – SSO (OAuth Client) plugin for WordPress is vulnerable to Improper Verification of Cryptographic Signature in versions up to, and including, 6.26.12. This is due to the plugin performing unsafe JWT token processing without verification or validation in the `get_resource_owner_from_id_token` function. This makes it possible for unauthenticated attackers to bypass authentication and gain access to any existing user account - including administrators in certain configurations - or to create arbitrary subscriber-level accounts.
References
Configurations
No configuration.
History
04 Oct 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-10-04 03:15
Updated : 2025-10-04 03:15
NVD link : CVE-2025-9485
Mitre link : CVE-2025-9485
CVE.ORG link : CVE-2025-9485
JSON object : View
Products Affected
No product.
CWE
CWE-347
Improper Verification of Cryptographic Signature