The OAuth Single Sign On – SSO (OAuth Client) plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 6.26.14. This is due to missing capability checks and authentication verification on the OAuth redirect functionality accessible via the 'oauthredirect' option parameter. This makes it possible for unauthenticated attackers to set the global redirect URL option via the redirect_url parameter granted they can access the site directly.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 06 Feb 2026 07:00:00 +0000

Type Values Removed Values Added
Description The OAuth Single Sign On – SSO (OAuth Client) plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 6.26.14. This is due to missing capability checks and authentication verification on the OAuth redirect functionality accessible via the 'oauthredirect' option parameter. This makes it possible for unauthenticated attackers to set the global redirect URL option via the redirect_url parameter granted they can access the site directly.
Title OAuth Single Sign On – SSO (OAuth Client) <= 6.26.14 - Missing Authorization
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-02-06T06:46:30.162Z

Reserved: 2025-09-19T20:41:51.812Z

Link: CVE-2025-10753

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-06T07:16:10.940

Modified: 2026-02-06T07:16:10.940

Link: CVE-2025-10753

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses