top of page
perceptive_background_267k.jpg

Pocket ID is an OIDC provider that allows users to authenticate with their passkeys to your services. Prior to 2.4.0, the OIDC token endpoint rejects an authori…

Published:

9 March 2026 at 23:00:00

Alert date:

10 March 2026 at 18:06:15

Source:

nvd.nist.gov

Click to open the original link from this advisory

Identity & Access, Web Technologies

Pocket ID, an OpenID Connect (OIDC) provider for passkey authentication, contains a vulnerability in versions prior to 2.4.0. The OIDC token endpoint improperly validates authorization codes, only rejecting them when both the client ID is wrong AND the code is expired. This flaw allows attackers to perform cross-client code exchange and reuse expired authorization codes. The vulnerability enables unauthorized access across different clients and extends the lifespan of expired tokens. This issue has been patched in version 2.4.0 of Pocket ID.

Technical details

Mitigation steps:

Affected products:

Pocket ID

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page