Home

Description

The OAuth Single Sign On – SSO (OAuth Client) plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 6.26.14. This is due to missing capability checks and authentication verification on the OAuth redirect functionality accessible via the 'oauthredirect' option parameter. This makes it possible for unauthenticated attackers to set the global redirect URL option via the redirect_url parameter granted they can access the site directly.

PUBLISHED Reserved 2025-09-19 | Published 2026-02-06 | Updated 2026-02-06 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-11-17:Vendor Notified
2026-02-05:Disclosed

Credits

Jonas Benjamin Friedli finder

References

www.wordfence.com/...-ad9c-4849-8ae0-3ded18720a1f?source=cve

plugins.trac.wordpress.org/...26.12/class-mooauth-widget.php

plugins.trac.wordpress.org/...facebook&sfp_email=&sfph_mail=

cve.org (CVE-2025-10753)

nvd.nist.gov (CVE-2025-10753)

Download JSON