CVE-2026-3432
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Lifecycle Timeline
2Tags
Description
On SimStudio version below to 0.5.74, the `/api/auth/oauth/token` endpoint contains a code path that bypasses all authorization checks when provided with `credentialAccountUserId` and `providerId` parameters. An unauthenticated attacker can retrieve OAuth access tokens for any user by supplying their user ID and a provider name, effectively stealing credentials to third-party services.
Analysis
SimStudio has a second authorization flaw in the OAuth token endpoint that allows privilege escalation through crafted token requests.
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Identify all SimStudio instances and their versions; isolate or disable the `/api/auth/oauth/token` endpoint if possible; enable enhanced logging on authentication events. Within 7 days: Contact vendor for patch availability and deployment timeline; implement network-based controls to restrict access to the vulnerable endpoint; conduct access logs review for suspicious OAuth token requests. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today