Cyber Posture

CVE-2026-28513

HighPublic PoC

Published: 10 March 2026

Published
10 March 2026
Modified
13 March 2026
KEV Added
Patch
CVSS Score 8.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
EPSS Score 0.0001 2.8th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-28513 is a high-severity Incorrect Authorization (CWE-863) vulnerability in Pocket-Id Pocket Id. Its CVSS base score is 8.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 2.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and IA-13 (Identity Providers and Authorization Servers).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Mandates verification of correct implementation and configuration of authorization servers like Pocket ID to enforce independent client ID and expiration validation, directly preventing cross-client code exchange and expired code reuse.

prevent

Enforces approved authorizations in OIDC token endpoints to bind authorization codes to specific client IDs, mitigating improper access enforcement that allows cross-client exchanges.

prevent

Requires validation of inputs to the token endpoint, ensuring client ID and code expiration are checked independently to reject invalid or expired authorization codes.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1528 Steal Application Access Token Credential Access
Adversaries can steal application access tokens as a means of acquiring credentials to access remote systems and resources.
Why these techniques?

Vulnerability in public OIDC token endpoint enables direct exploitation of a network-accessible auth service (T1190) and illicit acquisition of application access tokens via cross-client code exchange (T1528).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Pocket ID is an OIDC provider that allows users to authenticate with their passkeys to your services. Prior to 2.4.0, the OIDC token endpoint rejects an authorization code only when both the client ID is wrong and the code is…

more

expired. This allows cross-client code exchange and expired code reuse. This vulnerability is fixed in 2.4.0.

Deeper analysisAI

CVE-2026-28513 affects Pocket ID, an OpenID Connect (OIDC) provider that enables users to authenticate services using passkeys. In versions prior to 2.4.0, the OIDC token endpoint improperly validates authorization codes, rejecting them only when both the client ID is incorrect and the code is expired. This flaw enables cross-client authorization code exchange and reuse of expired codes, mapped to CWE-863 (Incorrect Authorization). The vulnerability carries a CVSS v3.1 base score of 8.5 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N), indicating high severity due to network accessibility, low attack complexity, and significant confidentiality impact across a changed scope.

An attacker with low privileges, such as a legitimate but malicious OIDC client or authenticated user, can exploit this over the network without user interaction. By obtaining a valid authorization code from one client—through interception, social engineering, or other means—the attacker can exchange it at a different client ID to obtain access tokens. Similarly, expired codes can be reused before full expiration checks trigger alongside client ID mismatches. Successful exploitation grants high confidentiality access, potentially allowing token issuance for unauthorized clients and subsequent service impersonation or data exfiltration.

The GitHub security advisory (GHSA-qh6q-598w-w6m2) confirms the issue is resolved in Pocket ID version 2.4.0, where the token endpoint enforces proper validation of client ID and code expiration independently. Security practitioners should upgrade to 2.4.0 or later and review OIDC client configurations for code handling best practices.

Details

CWE(s)

Affected Products

pocket-id
pocket id
≤ 2.4.0

CVEs Like This One

CVE-2026-28512Same product: Pocket-Id Pocket Id
CVE-2025-69414Shared CWE-863
CVE-2026-30965Shared CWE-863
CVE-2026-33461Shared CWE-863
CVE-2026-34376Shared CWE-863
CVE-2026-23989Shared CWE-863
CVE-2026-4933Shared CWE-863
CVE-2026-31887Shared CWE-863
CVE-2026-28808Shared CWE-863
CVE-2026-34532Shared CWE-863

References