Description
Tinyauth is an authentication and authorization server. Prior to 5.0.3, the OIDC authorization endpoint allows users with a TOTP-pending session (password verified, TOTP not yet completed) to obtain authorization codes. An attacker who knows a user's password but not their TOTP secret can obtain valid OIDC tokens, completely bypassing the second factor. This vulnerability is fixed in 5.0.3.
Published: 2026-03-12
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Bypass Two‑Factor Authentication via OIDC
Action: Immediate Patch
AI Analysis

Impact

The vulnerability exists in Tinyauth versions prior to 5.0.3 where the OIDC authorization endpoint will return an authorization code if a user has entered a valid password but has not yet completed the TOTP step. The attacker can therefore obtain OIDC tokens without the second factor. This is a CWE‑287 Authentication Bypass Vulnerability that can give the attacker unauthorized access to protected APIs and resources, compromising confidentiality and integrity.

Affected Systems

Affected vendor: steveiliop56; product: Tinyauth. All releases of the product with a version less than 5.0.3 are impacted. The provided CPE string cpe:2.3:a:tinyauth:tinyauth:* indicates that any instance of the software older than 5.0.3 satisfies the affected scope.

Risk and Exploitability

The CVSS score of 8.5 indicates high severity. The EPSS score is below 1 %, implying a low short‑term likelihood of exploitation, and the vulnerability is not listed in CISA’s KEV catalog. Based on the description, the likely attack vector is a remote, network‑based request to the OIDC authorize endpoint and requires the attacker to know a legitimate user’s password. No local privileges are required. The exploitation chain consists of an OIDC authorization request for a session that is TOTP‑pending; the server erroneously issues the authorization code, which the attacker can redeem for access tokens. The attack does not depend on device compromise, so the breach scope can affect any user authenticated through the affected server.

Generated by OpenCVE AI on March 19, 2026 at 21:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Tinyauth to version 5.0.3 or later to disable the OIDC authorization endpoint for TOTP‑pending sessions.

Generated by OpenCVE AI on March 19, 2026 at 21:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3q28-qjrv-qr39 Tinyauth vulnerable to TOTP/2FA bypass via OIDC authorize endpoint
History

Thu, 19 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Tinyauth
Tinyauth tinyauth
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:tinyauth:tinyauth:*:*:*:*:*:*:*:*
Vendors & Products Tinyauth
Tinyauth tinyauth

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Steveiliop56
Steveiliop56 tinyauth
Vendors & Products Steveiliop56
Steveiliop56 tinyauth

Thu, 12 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Description Tinyauth is an authentication and authorization server. Prior to 5.0.3, the OIDC authorization endpoint allows users with a TOTP-pending session (password verified, TOTP not yet completed) to obtain authorization codes. An attacker who knows a user's password but not their TOTP secret can obtain valid OIDC tokens, completely bypassing the second factor. This vulnerability is fixed in 5.0.3.
Title Tinyauth vulnerable to TOTP/2FA bypass via OIDC authorize endpoint
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N'}


Subscriptions

Steveiliop56 Tinyauth
Tinyauth Tinyauth
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-12T20:46:24.238Z

Reserved: 2026-03-11T14:47:05.685Z

Link: CVE-2026-32246

cve-icon Vulnrichment

Updated: 2026-03-12T20:43:39.320Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T19:16:19.577

Modified: 2026-03-19T20:35:26.040

Link: CVE-2026-32246

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T09:54:58Z

Weaknesses