Upstream information

CVE-2026-32245 at MITRE

Description

Tinyauth is an authentication and authorization server. Prior to 5.0.3, the OIDC token endpoint does not verify that the client exchanging an authorization code is the same client the code was issued to. A malicious OIDC client operator can exchange another client's authorization code using their own client credentials, obtaining tokens for users who never authorized their application. This violates RFC 6749 Section 4.1.3. This vulnerability is fixed in 5.0.3.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v3 Scores
CVSS detail CNA (GitHub) National Vulnerability Database
Base Score 6.5 6.5
Vector CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
Attack Vector Network Network
Attack Complexity High High
Privileges Required Low None
User Interaction Required None
Scope Changed Unchanged
Confidentiality Impact Low Low
Integrity Impact High High
Availability Impact None None
CVSSv3 Version 3.1 3.1
No SUSE Bugzilla entries cross referenced.

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References


SUSE Timeline for this CVE

CVE page created: Thu Mar 12 22:03:30 2026
CVE page last modified: Thu Mar 26 01:46:33 2026