Home

Description

Versions of the package fastapi-sso before 0.19.0 are vulnerable to Cross-site Request Forgery (CSRF) due to the improper validation of the OAuth state parameter during the authentication callback. While the get_login_url method allows for state generation, it does not persist the state or bind it to the user's session. Consequently, the verify_and_process method accepts the state received in the query parameters without verifying it against a trusted local value. This allows a remote attacker to trick a victim into visiting a malicious callback URL, which can result in the attacker's account being linked to the victim's internal account.

PUBLISHED Reserved 2025-12-11 | Published 2025-12-19 | Updated 2025-12-19 | Assigner snyk




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N/E:P

Problem types

Cross-site Request Forgery (CSRF)

Credits

David Borș (Snyk Security Research)

References

security.snyk.io/vuln/SNYK-PYTHON-FASTAPISSO-14386403

github.com/...ommit/6117d1a5ad498ba57d671e8a059ebe20db5abe02

github.com/tomasvotava/fastapi-sso/issues/266

cve.org (CVE-2025-14546)

nvd.nist.gov (CVE-2025-14546)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.