CVE-2026-9084
MISP OIDC authentication bypass via automatic email-based account linking under insecure IdP configurations
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
MISP’s OIDC authentication plugin allowed automatic linking of an OIDC identity to an existing local user account based on the email claim when the local account had no stored sub value. Under insecure or untrusted IdP configurations where email ownership is not enforced, an attacker with a valid OIDC token could assert a victim’s email address and authenticate as that user, leading to account takeover.
| CWE | CWE-287 |
| Vendor | misp |
| Product | misp |
| Published | May 20, 2026 |
| Last Updated | May 20, 2026 |
Stay Ahead of the Next One
Get instant alerts for misp misp
Be the first to know when new unknown vulnerabilities affecting misp misp are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
misp / misp
2.5.0 ≤ 2.5.37
References
Credits
Ali Ganiyev Luciano Righetti