🔐 CVE Alert

CVE-2025-10752

MEDIUM 4.3

OAuth Single Sign On – SSO (OAuth Client) <= 6.26.12 - Cross-Site Request Forgery

CVSS Score
4.3
EPSS Score
0.0%
EPSS Percentile
0th

The OAuth Single Sign On – SSO (OAuth Client) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.26.12. This is due to using a predictable state parameter (base64 encoded app name) without any randomness in the OAuth flow. This makes it possible for unauthenticated attackers to forge OAuth authorization requests and potentially hijack the OAuth flow via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CWE CWE-352
Vendor cyberlord92
Product oauth single sign on – sso (oauth client)
Published Sep 26, 2025
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for cyberlord92 oauth single sign on – sso (oauth client)

Be the first to know when new medium vulnerabilities affecting cyberlord92 oauth single sign on – sso (oauth client) are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

cyberlord92 / OAuth Single Sign On – SSO (OAuth Client)
0 ≤ 6.26.12

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/e8d7e8f3-e8ff-460f-a343-807bcdb865dc?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/miniorange-login-with-eve-online-google-facebook/tags/6.26.12/class-mooauth-widget.php#L285 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3360768%40miniorange-login-with-eve-online-google-facebook&new=3360768%40miniorange-login-with-eve-online-google-facebook&sfp_email=&sfph_mail=

Credits

Jonas Benjamin Friedli