top of page
perceptive_background_267k.jpg

Pocket ID is an OIDC provider that allows users to authenticate with their passkeys to your services. Prior to 2.4.0, the OIDC token endpoint rejects an authori…

Published:

9 maart 2026 om 23:00:00

Alert date:

10 maart 2026 om 18:06:15

Source:

nvd.nist.gov

Click to open the original link from this advisory

Identity & Access, Web Technologies

Pocket ID, an OpenID Connect (OIDC) provider for passkey authentication, contains a vulnerability in versions prior to 2.4.0. The OIDC token endpoint improperly validates authorization codes, only rejecting them when both the client ID is wrong AND the code is expired. This flaw allows attackers to perform cross-client code exchange and reuse expired authorization codes. The vulnerability enables unauthorized access across different clients and extends the lifespan of expired tokens. This issue has been patched in version 2.4.0 of Pocket ID.

Technical details

Mitigation steps:

Affected products:

Pocket ID

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page