Description
The OAuth Single Sign On – SSO (OAuth Client) plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 6.26.14. This is due to missing capability checks and authentication verification on the OAuth redirect functionality accessible via the 'oauthredirect' option parameter. This makes it possible for unauthenticated attackers to set the global redirect URL option via the redirect_url parameter granted they can access the site directly.
Published: 2026-02-06
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access via Unchecked Redirect URL
Action: Immediate Patch
AI Analysis

Impact

The OAuth Single Sign On – SSO (OAuth Client) plugin for WordPress operates its OAuth redirect endpoint without performing necessary capability checks. An attacker who can send HTTP requests to the site can supply a malicious redirect_url parameter, allowing the attacker to modify the global redirect URL in the database. This change can redirect legitimate users to attacker‑controlled sites, facilitating phishing or credential theft and compromising user account integrity and confidentiality.

Affected Systems

The vulnerability impacts the WordPress plugin OAuth Single Sign On – SSO (OAuth Client) from the vendor cyberlord92. All released builds through and including version 6.26.14 are affected. Site owners running any of these versions should verify that their redirect settings have not been altered.

Risk and Exploitability

The CVSS score of 5.3 reflects moderate severity, while the EPSS score of less than 1% indicates a low likelihood of exploitation at present. The vulnerability is not listed in CISA's KEV catalog. Attackers can exploit the flaw by sending unauthenticated HTTP requests to the site’s OAuth redirect handler, making the attack vector straightforward and not requiring user credentials. Once the global redirect URL is modified, subsequent authenticated logins may be redirected to malicious destinations.

Generated by OpenCVE AI on April 22, 2026 at 13:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the vendor’s official channel or the WordPress plugin repository for an updated version that addresses this vulnerability, and install it if available.
  • If an update is not immediately available, restrict direct access to the oauthredirect endpoint using firewall rules or a web‑application‑firewall to block unauthenticated requests.
  • As a temporary workaround, disable the OAuth redirect functionality by removing the redirect_url option from the plugin settings or deleting the option from the WordPress options table until a patch is applied.

Generated by OpenCVE AI on April 22, 2026 at 13:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Cyberlord92
Cyberlord92 oauth Single Sign On – Sso (oauth Client)
Wordpress
Wordpress wordpress
Vendors & Products Cyberlord92
Cyberlord92 oauth Single Sign On – Sso (oauth Client)
Wordpress
Wordpress wordpress

Fri, 06 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Feb 2026 07:00:00 +0000

Type Values Removed Values Added
Description The OAuth Single Sign On – SSO (OAuth Client) plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 6.26.14. This is due to missing capability checks and authentication verification on the OAuth redirect functionality accessible via the 'oauthredirect' option parameter. This makes it possible for unauthenticated attackers to set the global redirect URL option via the redirect_url parameter granted they can access the site directly.
Title OAuth Single Sign On – SSO (OAuth Client) <= 6.26.14 - Missing Authorization
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Cyberlord92 Oauth Single Sign On – Sso (oauth Client)
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:09:14.056Z

Reserved: 2025-09-19T20:41:51.812Z

Link: CVE-2025-10753

cve-icon Vulnrichment

Updated: 2026-02-06T19:24:40.455Z

cve-icon NVD

Status : Deferred

Published: 2026-02-06T07:16:10.940

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-10753

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T14:00:18Z

Weaknesses