An issue was discovered in the oidc (aka OpenID Connect Authentication) extension before 4.0.0 for TYPO3. The account linking logic allows a pre-hijacking attack, leading to Account Takeover. The attack can only be exploited if the following requirements are met: (1) an attacker can anticipate the e-mail address of the user, (2) an attacker can register a public frontend user account using that e-mail address before the user's first OIDC login, and (3) the IDP returns an email field containing the e-mail address of the user,
Metrics
Affected Vendors & Products
References
History
Mon, 17 Mar 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sun, 16 Mar 2025 04:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered in the oidc (aka OpenID Connect Authentication) extension before 4.0.0 for TYPO3. The account linking logic allows a pre-hijacking attack, leading to Account Takeover. The attack can only be exploited if the following requirements are met: (1) an attacker can anticipate the email address of the user, and (2) an attacker can register a public frontend user account using that email address before the user's first OIDC login. | An issue was discovered in the oidc (aka OpenID Connect Authentication) extension before 4.0.0 for TYPO3. The account linking logic allows a pre-hijacking attack, leading to Account Takeover. The attack can only be exploited if the following requirements are met: (1) an attacker can anticipate the e-mail address of the user, (2) an attacker can register a public frontend user account using that e-mail address before the user's first OIDC login, and (3) the IDP returns an email field containing the e-mail address of the user, |
Weaknesses | CWE-348 | |
References |
| |
Metrics |
cvssV3_1
|
Sun, 16 Mar 2025 04:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered in the oidc (aka OpenID Connect Authentication) extension before 4.0.0 for TYPO3. The account linking logic allows a pre-hijacking attack, leading to Account Takeover. The attack can only be exploited if the following requirements are met: (1) an attacker can anticipate the email address of the user, and (2) an attacker can register a public frontend user account using that email address before the user's first OIDC login. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-17T15:44:18.669Z
Reserved: 2025-01-26T00:00:00.000Z
Link: CVE-2025-24856

Updated: 2025-03-17T15:44:14.420Z

Status : Received
Published: 2025-03-16T04:15:14.517
Modified: 2025-03-16T04:15:14.517
Link: CVE-2025-24856

No data.