Home

Description

Nhost is an open source Firebase alternative with GraphQL. Prior to 0.48.0, the auth service's OAuth provider callback flow places the refresh token directly into the redirect URL as a query parameter. Refresh tokens in URLs are logged in browser history, server access logs, HTTP Referer headers, and proxy/CDN logs. Note that the refresh token is one-time use and all of these leak vectors are on owned infrastructure or services integrated by the application developer. This vulnerability is fixed in 0.48.0.

PUBLISHED Reserved 2026-03-31 | Published 2026-04-06 | Updated 2026-04-07 | Assigner GitHub_M




LOW: 2.3CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

CWE-598: Use of GET Request Method With Sensitive Query Strings

Product status

< 0.48.0
affected

References

github.com/.../nhost/security/advisories/GHSA-g2qj-prgh-4g9r exploit

github.com/.../nhost/security/advisories/GHSA-g2qj-prgh-4g9r

cve.org (CVE-2026-34969)

nvd.nist.gov (CVE-2026-34969)

Download JSON