Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3gx8-q682-38mx | OpenID Connect nonce generated but never validated — ID token replay attack |
Wed, 13 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Roadiz
Roadiz core-bundle-dev-app |
|
| Vendors & Products |
Roadiz
Roadiz core-bundle-dev-app |
Fri, 08 May 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Roadiz is a polymorphic content management system based on a node system. Prior to versions 2.3.43, 2.5.45, 2.6.31, and 2.7.18, the roadiz/openid package generates an OIDC nonce in OAuth2LinkGenerator::generate() and includes it in the authorization request sent to the identity provider, but never stores it and never validates it on the callback. The OpenIdJwtConfigurationFactory validation chain does not include a nonce constraint, and OpenIdAuthenticator::authenticate() never checks the nonce claim in the returned ID token against a stored value. This issue has been patched in versions 2.3.43, 2.5.45, 2.6.31, and 2.7.18. | |
| Title | Roadiz OpenID Connect nonce generated but never validated — ID token replay attack | |
| Weaknesses | CWE-345 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T17:47:17.371Z
Reserved: 2026-04-25T05:04:37.027Z
Link: CVE-2026-42206
Updated: 2026-05-13T17:47:12.694Z
Status : Deferred
Published: 2026-05-08T22:16:31.963
Modified: 2026-05-13T16:49:32.233
Link: CVE-2026-42206
No data.
OpenCVE Enrichment
Updated: 2026-05-08T23:30:15Z
Github GHSA