


Perceptive Security
SOC/SIEM Consultancy

Pocket ID is an OIDC provider that allows users to authenticate with their passkeys to your services. Prior to 2.4.0, the OIDC token endpoint rejects an authoriā¦
Published:
9 March 2026 at 23:00:00
Alert date:
10 March 2026 at 18:06:15
Source:
nvd.nist.gov
Identity & Access, Web Technologies
Pocket ID, an OpenID Connect (OIDC) provider for passkey authentication, contains a vulnerability in versions prior to 2.4.0. The OIDC token endpoint improperly validates authorization codes, only rejecting them when both the client ID is wrong AND the code is expired. This flaw allows attackers to perform cross-client code exchange and reuse expired authorization codes. The vulnerability enables unauthorized access across different clients and extends the lifespan of expired tokens. This issue has been patched in version 2.4.0 of Pocket ID.
Technical details
Mitigation steps:
Affected products:
Pocket ID
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-28513
https://github.com/pocket-id/pocket-id/security/advisories/GHSA-qh6q-598w-w6m2
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
