We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-49006

Wasp has case insensitive OAuth ID vulnerability



Description

Wasp (Web Application Specification) is a Rails-like framework for React, Node.js, and Prisma. Prior to version 0.16.6, Wasp authentication has a vulnerability in the OAuth authentication implementation (affecting only Keycloak with a specific config). Wasp currently lowercases OAuth user IDs before storing / fetching them. This behavior violates OAuth and OpenID Connect specifications and can result in user impersonation, account collisions, and privilege escalation. In practice, out of the OAuth providers that Wasp auth supports, only Keycloak is affected. Keycloak uses a lowercase UUID by default, but users can configure it to be case sensitive, making it affected. Google, GitHub, and Discord use numerical IDs, making them not affected. Users should update their Wasp version to `0.16.6` which has a fix for the problematic behavior. Users using Keycloak can work around the issue by not using a case sensitive user ID in their realm configuration.

Reserved 2025-05-29 | Published 2025-06-09 | Updated 2025-06-09 | Assigner GitHub_M


HIGH: 8.2CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-276: Incorrect Default Permissions

Product status

< 0.16.6
affected

References

github.com/...g/wasp/security/advisories/GHSA-qvjc-6xv7-6v5f

github.com/...ommit/433b9b7f491c172db656fb94cc85e5bd7d614b74

wasp-lang.notion.site/...ty-20018a74854c8064a2bfebe4eaf5fceb

cve.org (CVE-2025-49006)

nvd.nist.gov (CVE-2025-49006)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-49006

Support options

Helpdesk Chat, Email, Knowledgebase