it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
[IT-SecNots] [Security-news] OpenID Connect / OAuth client - Moderately critical - Access bypass - SA-CONTRIB-2026-026
Chronologisch Thread
- From: security-news AT drupal.org
- To: security-news AT drupal.org
- Subject: [IT-SecNots] [Security-news] OpenID Connect / OAuth client - Moderately critical - Access bypass - SA-CONTRIB-2026-026
- Date: Wed, 4 Mar 2026 18:02:15 +0000
- Archived-at: <https://lists.drupal.org/mailman3/hyperkitty/list/security-news AT drupal.org/message/XHRCKGMKW5MNGMRV3O4YICNYGRM2V6TG/>
- Authentication-results: lists.piratenpartei.de; dkim=pass header.d=drupal.org header.s=default header.b=InGarrAh; dkim=fail ("body hash did not verify") header.d=drupal.org header.s=f34odw3mfzgsrgyn3evjayysxxl6jizn header.b=ZbxigN71; dkim=fail ("body hash did not verify") header.d=amazonses.com header.s=gdwg2y3kokkkj5a55z2ilkup5wp5hhxx header.b=gDSCphZv; dmarc=pass (policy=none) header.from=drupal.org; spf=pass (lists.piratenpartei.de: domain of security-news-bounces AT drupal.org designates 140.211.166.136 as permitted sender) smtp.mailfrom=security-news-bounces AT drupal.org
- Dkim-filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org DC58B608D9
- Dkim-filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org 97AF860B0A
- Dmarc-filter: OpenDMARC Filter v1.4.2 smtp3.osuosl.org 97AF860B0A
- Feedback-id: ::1.us-west-2.eaokZ1GT8utLqfMHQoyOsEFVrSIzzS6R+14LP6WIIUY=:AmazonSES
- List-archive: <https://lists.drupal.org/mailman3/hyperkitty/list/security-news AT drupal.org/>
- List-id: <security-news.drupal.org>
View online: https://www.drupal.org/sa-contrib-2026-026
Project: OpenID Connect / OAuth client [1]
Date: 2026-March-04
Security risk: *Moderately critical* 10 ∕ 25
AC:Complex/A:User/CI:Some/II:None/E:Theoretical/TD:All [2]
Vulnerability: Access bypass
Affected versions: <1.5.0
CVE IDs: CVE-2026-3531
Description:
This module enables you to use an external OpenID Connect login provider to
authenticate and log in users on your site. If a user signs in with a login
provider for the first time on the website, a new Drupal user will be
created.
A visitor who successfully logs in to their Identity Provider and is denied
access to Drupal through custom code or a server error will maintain their
session at the Identity Provider, possibly leading to access bypass
situations, especially in a shared computing environment.
Solution:
Install the latest version:
* If you use the OpenID Connect 8.x-1.x module, upgrade to OpenID Connect
8.x-1.5 [3]
Reported By:
* Kimberley Massey (kimberleycgm) [4]
Fixed By:
* Kimberley Massey (kimberleycgm) [5]
* Philip Frilling (pfrilling) [6]
Coordinated By:
* Damien McKenna (damienmckenna) [7] of the Drupal Security Team
* Greg Knaddison (greggles) [8] of the Drupal Security Team
* Juraj Nemec (poker10) [9] of the Drupal Security Team
------------------------------------------------------------------------------
Contribution record [10]
[1] https://www.drupal.org/project/openid_connect
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/openid_connect/releases/8.x-1.5
[4] https://www.drupal.org/u/kimberleycgm
[5] https://www.drupal.org/u/kimberleycgm
[6] https://www.drupal.org/u/pfrilling
[7] https://www.drupal.org/u/damienmckenna
[8] https://www.drupal.org/u/greggles
[9] https://www.drupal.org/u/poker10
[10] https://new.drupal.org/contribution-record?source_link=https%3A//www.drupal.org/node/3577066
_______________________________________________
Security-news mailing list -- security-news AT drupal.org
To unsubscribe send an email to security-news-leave AT drupal.org
Unsubscribe at
- [IT-SecNots] [Security-news] OpenID Connect / OAuth client - Moderately critical - Access bypass - SA-CONTRIB-2026-026, security-news, 04.03.2026
Archiv bereitgestellt durch MHonArc 2.6.19+.