| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3gx8-q682-38mx | OpenID Connect nonce generated but never validated — ID token replay attack |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 13 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Roadiz
Roadiz core-bundle-dev-app |
|
| Vendors & Products |
Roadiz
Roadiz core-bundle-dev-app |
Fri, 08 May 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Roadiz is a polymorphic content management system based on a node system. Prior to versions 2.3.43, 2.5.45, 2.6.31, and 2.7.18, the roadiz/openid package generates an OIDC nonce in OAuth2LinkGenerator::generate() and includes it in the authorization request sent to the identity provider, but never stores it and never validates it on the callback. The OpenIdJwtConfigurationFactory validation chain does not include a nonce constraint, and OpenIdAuthenticator::authenticate() never checks the nonce claim in the returned ID token against a stored value. This issue has been patched in versions 2.3.43, 2.5.45, 2.6.31, and 2.7.18. | |
| Title | Roadiz OpenID Connect nonce generated but never validated — ID token replay attack | |
| Weaknesses | CWE-345 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T17:47:17.371Z
Reserved: 2026-04-25T05:04:37.027Z
Link: CVE-2026-42206
Updated: 2026-05-13T17:47:12.694Z
Status : Deferred
Published: 2026-05-08T22:16:31.963
Modified: 2026-05-13T16:49:32.233
Link: CVE-2026-42206
No data.
OpenCVE Enrichment
Updated: 2026-05-08T23:30:15Z
Github GHSA