No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 20 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Misp
Misp misp |
|
| Vendors & Products |
Misp
Misp misp |
Wed, 20 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MISP’s OIDC authentication plugin allowed automatic linking of an OIDC identity to an existing local user account based on the email claim when the local account had no stored sub value. Under insecure or untrusted IdP configurations where email ownership is not enforced, an attacker with a valid OIDC token could assert a victim’s email address and authenticate as that user, leading to account takeover. | |
| Title | MISP OIDC authentication bypass via automatic email-based account linking under insecure IdP configurations | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CIRCL
Published:
Updated: 2026-05-20T15:28:55.640Z
Reserved: 2026-05-20T14:21:56.589Z
Link: CVE-2026-9084
Updated: 2026-05-20T15:28:52.979Z
Status : Awaiting Analysis
Published: 2026-05-20T16:16:28.107
Modified: 2026-05-20T17:31:45.303
Link: CVE-2026-9084
No data.
OpenCVE Enrichment
Updated: 2026-05-20T16:30:14Z