Home

Description

The OAuth Single Sign On – SSO (OAuth Client) plugin for WordPress is vulnerable to Improper Verification of Cryptographic Signature in versions up to, and including, 6.26.12. This is due to the plugin performing unsafe JWT token processing without verification or validation in the `get_resource_owner_from_id_token` function. This makes it possible for unauthenticated attackers to bypass authentication and gain access to any existing user account - including administrators in certain configurations - or to create arbitrary subscriber-level accounts.

PUBLISHED Reserved 2025-08-26 | Published 2025-10-04 | Updated 2025-10-06 | Assigner Wordfence




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-347 Improper Verification of Cryptographic Signature

Product status

Default status
unaffected

*
affected

Timeline

2025-08-15:Discovered
2025-10-03:Disclosed

Credits

Jonas Benjamin Friedli finder

References

www.wordfence.com/...-70d1-4dd5-b73b-62d182ee9a8a?source=cve

plugins.trac.wordpress.org/...26.12/class-mooauth-widget.php

plugins.trac.wordpress.org/...ith-eve-online-google-facebook

cve.org (CVE-2025-9485)

nvd.nist.gov (CVE-2025-9485)

Download JSON