The OAuth Single Sign On – SSO (OAuth Client) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.26.12. This is due to using a predictable state parameter (base64 encoded app name) without any randomness in the OAuth flow. This makes it possible for unauthenticated attackers to forge OAuth authorization requests and potentially hijack the OAuth flow via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Fri, 26 Sep 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 26 Sep 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Oauth Client Single Sign On Project
Oauth Client Single Sign On Project oauth Client Single Sign On Wordpress Wordpress wordpress |
|
Vendors & Products |
Oauth Client Single Sign On Project
Oauth Client Single Sign On Project oauth Client Single Sign On Wordpress Wordpress wordpress |
Fri, 26 Sep 2025 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The OAuth Single Sign On – SSO (OAuth Client) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.26.12. This is due to using a predictable state parameter (base64 encoded app name) without any randomness in the OAuth flow. This makes it possible for unauthenticated attackers to forge OAuth authorization requests and potentially hijack the OAuth flow via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | |
Title | OAuth Single Sign On – SSO (OAuth Client) <= 6.26.12 - Cross-Site Request Forgery | |
Weaknesses | CWE-352 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-09-26T19:24:44.021Z
Reserved: 2025-09-19T20:37:57.485Z
Link: CVE-2025-10752

Updated: 2025-09-26T19:24:39.220Z

Status : Awaiting Analysis
Published: 2025-09-26T02:15:51.530
Modified: 2025-09-26T14:32:19.853
Link: CVE-2025-10752

No data.