Submit #775469: Kodbox 1.64 Improper Access Controlsinfo

TitelKodbox 1.64 Improper Access Controls
Beschreibungkodbox’s OAuth integration contains a critical logic flaw. The login API user/index/loginSubmit accepts a client-supplied third JSON and uses only the type/unionid pair to look up a binding in the database and log the user in, without verifying any real OAuth callback, signature, state, or nonce. Separately, the plugin/oauth/bind&method=bind endpoint—CSRF-exempt and lacking server-side verification—allows an authenticated session to bind any attacker-chosen openid/unionid to its account. By first binding their own unionid to a victim (e.g., via CSRF or any authenticated access) and then, from an unauthenticated context, submitting a forged third JSON containing that unionid, an attacker can reliably log in as the victim, including the root administrator. The fix requires rejecting raw client third data, validating all OAuth identities via trusted server-to-server flows, enforcing CSRF protection and POST-only on bind operations, and adding strong verification and auditing around unionid bindings.
Quelle⚠️ https://vulnplus-note.wetolink.com/share/IJW1LjsyomCQ
Benutzer
 vulnplusbot (UID 96250)
Einreichung09.03.2026 04:26 (vor 1 Monat)
Moderieren22.03.2026 12:40 (13 days later)
StatusAkzeptiert
VulDB Eintrag352426 [kalcaddle kodbox 1.64 loginSubmit API index.class.php third Cross Site Request Forgery]
Punkte20

Want to know what is going to be exploited?

We predict KEV entries!