CVE-2025-14546
Description
Versions of the package fastapi-sso before 0.19.0 are vulnerable to Cross-site Request Forgery (CSRF) due to the improper validation of the OAuth state parameter during the authentication callback. While the get_login_url method allows for state generation, it does not persist the state or bind it to the user's session. Consequently, the verify_and_process method accepts the state received in the query parameters without verifying it against a trusted local value. This allows a remote attacker to trick a victim into visiting a malicious callback URL, which can result in the attacker's account being linked to the victim's internal account.
CWE
- CWE-285 — Cross-site Request Forgery (CSRF)
Affected
- n/a / fastapi-sso — v=0 <0.19.0 [affected]
CVSS
- 4.0 score=6.9 severity=MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:P - 3.1 score=6.3 severity=MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N/E:P
References
- https://security.snyk.io/vuln/SNYK-PYTHON-FASTAPISSO-14386403
- https://github.com/tomasvotava/fastapi-sso/commit/6117d1a5ad498ba57d671e8a059ebe20db5abe02
- https://github.com/tomasvotava/fastapi-sso/issues/266
Source
cvelistV5-main/cves/2025/14xxx/CVE-2025-14546.json