Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.tenable.com/security/research/tra-2026-13 |
|
Mon, 02 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Mar 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | On SimStudio version below to 0.5.74, the `/api/auth/oauth/token` endpoint contains a code path that bypasses all authorization checks when provided with `credentialAccountUserId` and `providerId` parameters. An unauthenticated attacker can retrieve OAuth access tokens for any user by supplying their user ID and a provider name, effectively stealing credentials to third-party services. | |
| Title | Sim Studio AI - Unauthenticated OAuth Token Theft | |
| Weaknesses | CWE-862 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2026-03-02T13:32:11.796Z
Reserved: 2026-03-02T12:42:30.208Z
Link: CVE-2026-3432
Updated: 2026-03-02T13:32:08.295Z
Status : Received
Published: 2026-03-02T13:16:05.367
Modified: 2026-03-02T13:16:05.367
Link: CVE-2026-3432
No data.
OpenCVE Enrichment
No data.