Description
On SimStudio version below to 0.5.74, the `/api/auth/oauth/token` endpoint contains a code path that bypasses all authorization checks when provided with `credentialAccountUserId` and `providerId` parameters. An unauthenticated attacker can retrieve OAuth access tokens for any user by supplying their user ID and a provider name, effectively stealing credentials to third-party services.
Published: 2026-03-02
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: OAuth Token Theft
Action: Immediate Patch
AI Analysis

Impact

SimStudio version entries prior to 0.5.74 contain a flaw in the "/api/auth/oauth/token" endpoint that ignores authorization checks when the request includes the parameters credentialAccountUserId and providerId. The result is that an unauthenticated user can request an OAuth access token for any account by simply supplying a user ID and the name of the third‑party provider. The stolen tokens can then be used to impersonate the user on the external service, giving the attacker full access to the services that rely on OAuth for authentication. This vulnerability represents a new credential theft primitive that bypasses all access controls and can be used to compromise users without needing any prior knowledge of their credentials.

Affected Systems

The affected product is SimStudioAI’s Sim product. Vulnerable releases are all SimStudio versions earlier than 0.5.74. No other vendors or products are listed. The exact affected versions are not enumerated, but the warning applies to any installation that has not yet reached the 0.5.74 release.

Risk and Exploitability

The CVSS score of 9.3 indicates a critical severity. The EPSS score of <1% suggests an overall low likelihood of exploitation at present, and the vulnerability has not yet been reported in CISA’s Known Exploited Vulnerabilities catalog. Exploitability requires only network access to the target’s API and does not depend on user interaction; therefore an attacker can execute the attack simply by sending a crafted HTTP request. The lack of authentication checks means the attacker can recover tokens for any user, potentially enabling lateral movement and full compromise of the victim’s third‑party accounts.

Generated by OpenCVE AI on April 16, 2026 at 14:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SimStudio to version 0.5.74 or later, which implements proper authorization checks for the OAuth token endpoint.
  • Apply a network filter or firewall rule to block unauthenticated requests to the /api/auth/oauth/token endpoint from untrusted networks.
  • Implement logging and alerting for repeated unauthenticated requests to /api/auth/oauth/token to detect possible abuse.

Generated by OpenCVE AI on April 16, 2026 at 14:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Sim
Sim sim
CPEs cpe:2.3:a:sim:sim:*:*:*:*:*:*:*:*
Vendors & Products Sim
Sim sim
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Wed, 04 Mar 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Simstudioai
Simstudioai sim
Vendors & Products Simstudioai
Simstudioai sim

Mon, 02 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Description On SimStudio version below to 0.5.74, the `/api/auth/oauth/token` endpoint contains a code path that bypasses all authorization checks when provided with `credentialAccountUserId` and `providerId` parameters. An unauthenticated attacker can retrieve OAuth access tokens for any user by supplying their user ID and a provider name, effectively stealing credentials to third-party services.
Title Sim Studio AI - Unauthenticated OAuth Token Theft
Weaknesses CWE-862
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: tenable

Published:

Updated: 2026-03-02T13:32:11.796Z

Reserved: 2026-03-02T12:42:30.208Z

Link: CVE-2026-3432

cve-icon Vulnrichment

Updated: 2026-03-02T13:32:08.295Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-02T13:16:05.367

Modified: 2026-03-06T20:30:11.763

Link: CVE-2026-3432

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T14:45:25Z

Weaknesses