The OAuth Single Sign On – SSO (OAuth Client) plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 6.26.14. This is due to missing capability checks and authentication verification on the OAuth redirect functionality accessible via the 'oauthredirect' option parameter. This makes it possible for unauthenticated attackers to set the global redirect URL option via the redirect_url parameter granted they can access the site directly.
Metrics
Affected Vendors & Products
References
History
Fri, 06 Feb 2026 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The OAuth Single Sign On – SSO (OAuth Client) plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 6.26.14. This is due to missing capability checks and authentication verification on the OAuth redirect functionality accessible via the 'oauthredirect' option parameter. This makes it possible for unauthenticated attackers to set the global redirect URL option via the redirect_url parameter granted they can access the site directly. | |
| Title | OAuth Single Sign On – SSO (OAuth Client) <= 6.26.14 - Missing Authorization | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-02-06T06:46:30.162Z
Reserved: 2025-09-19T20:41:51.812Z
Link: CVE-2025-10753
No data.
Status : Received
Published: 2026-02-06T07:16:10.940
Modified: 2026-02-06T07:16:10.940
Link: CVE-2025-10753
No data.
OpenCVE Enrichment
No data.