top of page
perceptive_background_267k.jpg

Tinyauth is an authentication and authorization server. Prior to 5.0.3, the OIDC authorization endpoint allows users with a TOTP-pending session (password verif…

Published:

11 maart 2026 om 23:00:00

Alert date:

12 maart 2026 om 20:01:55

Source:

nvd.nist.gov

Click to open the original link from this advisory

Identity & Access, Web Technologies

Tinyauth authentication and authorization server contains a vulnerability in versions prior to 5.0.3 where the OIDC authorization endpoint allows users with TOTP-pending sessions to obtain authorization codes. An attacker with knowledge of a user's password but not their TOTP secret can obtain valid OIDC tokens, completely bypassing the second factor authentication. This represents a significant security flaw in multi-factor authentication implementation. The vulnerability has been fixed in version 5.0.3.

Technical details

Mitigation steps:

Affected products:

Tinyauth

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page