OAuth Dynamic Client Registration Permissive Redirect URI

OAuth Dynamic Client Registration requires specifying redirect URIs during the registration process. When the OAuth server accepts permissive redirect URIs, such as those allowing arbitrary hosts or o ...

Continue Reading
OAuth Dynamic Client Registration Detected

This is an informational plugin to inform the user that the scanner has detected a publicly accessible OAuth Dynamic Client Registration endpoint on the target application. OAuth Dynamic Client Regist ...

Continue Reading
CVE-2025-7444 LoginPress Pro <= 5.0.1 – Authentication Bypass via WordPress.com OAuth provider

The LoginPress Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 5.0.1. This is due to insufficient verification on the user being returned by the s ...

Continue Reading
CVE-2025-7444 LoginPress Pro <= 5.0.1 – Authentication Bypass via WordPress.com OAuth provider

The LoginPress Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 5.0.1. This is due to insufficient verification on the user being returned by the s ...

Continue Reading
CVE-2025-7444 LoginPress Pro <= 5.0.1 – Authentication Bypass via WordPress.com OAuth provider

The LoginPress Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 5.0.1. This is due to insufficient verification on the user being returned by the s ...

Continue Reading
WordPress LoginPress Pro Plugin <= 5.0.1 is vulnerable to Broken Authentication

Software LoginPress Pro Type Plugin Vulnerable versions &lt;= 5.0.1 Fixed in 5.0.2 OWASP Top 10 A7: Identification and Authentication Failures Classification Broken Authentication CVE CVE-2025 ...

Continue Reading
Open Redirect

better-auth is vulnerable to open redirect. The vulnerability is due to improper validation of user-supplied URLs in the originCheck middleware, which allows an attacker to redirect users to arbitrary ...

Continue Reading
Securing Agentic AI: How to Protect the Invisible Identity Access

AI agents promise to automate everything from financial reconciliations to incident response. Yet every time an AI agent spins up a workflow, it has to authenticate somewhere; often with a high-privil ...

Continue Reading

Back to Main

Subscribe for the latest news: