Description
Nhost is an open source Firebase alternative with GraphQL. Prior to 0.48.0, the auth service's OAuth provider callback flow places the refresh token directly into the redirect URL as a query parameter. Refresh tokens in URLs are logged in browser history, server access logs, HTTP Referer headers, and proxy/CDN logs. Note that the refresh token is one-time use and all of these leak vectors are on owned infrastructure or services integrated by the application developer. This vulnerability is fixed in 0.48.0.
Published: 2026-04-06
Score: 2.3 Low
EPSS: < 1% Very Low
KEV: No
Impact: Confidentiality Breach via Refresh Token Leakage
Action: Immediate Patch
AI Analysis

Impact

Nhost, an open source Firebase alternative, allows users to authenticate via OAuth providers. A flaw in the OAuth callback flow before version 0.48.0 places the refresh token directly into the redirect URL as a query parameter. Because URLs can be logged by browsers, servers, and network devices, the refresh token becomes exposed in browser history, server logs, HTTP referer headers, and proxy or CDN logs. This leakage could allow an attacker who gains access to any of those logs to harvest a one‑time use refresh token and then use it to obtain a new access token, thereby gaining unauthorized access to user accounts and protected resources, compromising confidentiality.

Affected Systems

Vendors: Nhost. Product: Nhost authentication service. Affected versions: any release before 0.48.0 that implements the OAuth provider callback flow. The vulnerability is resolved in version 0.48.0 and later.

Risk and Exploitability

CVSS score is 2.3, indicating low overall severity. No EPSS score is available, and the issue is not listed in the CISA KEV catalog. The vulnerability can be exploited through the normal OAuth login process; an attacker only needs to observe server, CDN, or proxy logs to capture the leaked token. Because refresh tokens are one‑time use, the window of exploitation is narrow, but compromised tokens still enable access to user resources until invalidated. The risk is moderate for environments that retain logs and expose them to attackers or insiders.

Generated by OpenCVE AI on April 6, 2026 at 19:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Nhost to version 0.48.0 or later.

Generated by OpenCVE AI on April 6, 2026 at 19:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-g2qj-prgh-4g9r Nhost Leaks Refresh Tokens via URL Query Parameter in OAuth Provider Callback
History

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Nhost
Nhost nhost
Vendors & Products Nhost
Nhost nhost

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Description Nhost is an open source Firebase alternative with GraphQL. Prior to 0.48.0, the auth service's OAuth provider callback flow places the refresh token directly into the redirect URL as a query parameter. Refresh tokens in URLs are logged in browser history, server access logs, HTTP Referer headers, and proxy/CDN logs. Note that the refresh token is one-time use and all of these leak vectors are on owned infrastructure or services integrated by the application developer. This vulnerability is fixed in 0.48.0.
Title Nhost Leaks the Refresh Token via URL Query Parameter in OAuth Provider Callback
Weaknesses CWE-200
CWE-598
References
Metrics cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T16:00:25.296Z

Reserved: 2026-03-31T19:38:31.616Z

Link: CVE-2026-34969

cve-icon Vulnrichment

Updated: 2026-04-07T15:47:28.542Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-06T16:16:38.457

Modified: 2026-04-07T17:16:28.800

Link: CVE-2026-34969

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T09:39:17Z

Weaknesses