CVE-2026-28512
Published: 10 March 2026
Summary
CVE-2026-28512 is a high-severity Open Redirect (CWE-601) vulnerability in Pocket-Id Pocket Id. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 3.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vuln in public-facing OIDC provider (improper redirect_uri validation) is directly exploitable over the network (T1190) via crafted malicious authorization links delivered by phishing to steal auth codes (T1566.002).
NVD Description
Pocket ID is an OIDC provider that allows users to authenticate with their passkeys to your services. From 2.0.0 to before 2.4.0, a flaw in callback URL validation allowed crafted redirect_uri values containing URL userinfo (@) to bypass legitimate callback…
more
pattern checks. If an attacker can trick a user into opening a malicious authorization link, the authorization code may be redirected to an attacker-controlled host. This vulnerability is fixed in 2.4.0.
Deeper analysisAI
Pocket ID, an OpenID Connect (OIDC) provider enabling passkey-based authentication for services, contains a vulnerability in versions 2.0.0 through 2.3.x designated as CVE-2026-28512. The flaw stems from improper callback URL validation, specifically allowing crafted redirect_uri parameters that include URL userinfo components (e.g., containing "@") to bypass legitimate callback pattern checks. This issue, mapped to CWE-601 (URL Redirection to Untrusted Site), carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N).
An attacker can exploit this vulnerability over the network with low complexity and no required privileges by tricking a user into interacting with a malicious authorization link, such as via phishing. Successful exploitation redirects the authorization code to an attacker-controlled host, enabling high confidentiality impact through potential theft of the code for further unauthorized access, alongside low integrity impact.
The vulnerability is addressed in Pocket ID version 2.4.0. Security practitioners should upgrade to this patched release, as detailed in the GitHub security advisory (GHSA-9h33-g3ww-mqff) and the fixing commit (3a339e33191c31b68bf57db907f800d9de5ffbc8).
Details
- CWE(s)