Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-31842 | A vulnerability in the expo.io framework allows an attacker to take over accounts and steal credentials on an application/website that configured the "Expo AuthSession Redirect Proxy" for social sign-in. This can be achieved once a victim clicks a malicious link. The link itself may be sent to the victim in various ways (including email, text message, an attacker-controlled website, etc). |
Github GHSA |
GHSA-wr5g-q49g-548w | Expo SDK has an OAuth vulnerability |
Tue, 04 Feb 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: checkpoint
Published:
Updated: 2025-02-04T16:33:56.283Z
Reserved: 2023-03-10T00:00:00.000Z
Link: CVE-2023-28131
Updated: 2024-08-02T12:30:24.407Z
Status : Modified
Published: 2023-04-24T05:15:08.653
Modified: 2025-02-04T17:15:13.310
Link: CVE-2023-28131
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA