top of page
perceptive_background_267k.jpg

Tinyauth is an authentication and authorization server. Prior to version 5.0.5, all three OAuth service implementations (GenericOAuthService, GithubOAuthService…

Published:

1 April 2026 at 22:00:00

Alert date:

2 April 2026 at 16:03:28

Source:

nvd.nist.gov

Click to open the original link from this advisory

Identity & Access, Web Technologies

Tinyauth authentication server prior to version 5.0.5 contains a critical race condition vulnerability in OAuth service implementations. All three OAuth services (GenericOAuthService, GithubOAuthService, GoogleOAuthService) store PKCE verifiers and access tokens as mutable struct fields on singleton instances shared across concurrent requests. When two users simultaneously initiate OAuth login for the same provider, a race condition between VerifyCode() and Userinfo() functions causes identity confusion, where one user receives a session with another user's identity. This represents a severe authentication bypass vulnerability that could lead to unauthorized access and account takeover. The issue has been patched in version 5.0.5.

Technical details

Mitigation steps:

Affected products:

Tinyauth

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page