CVE-2026-39976
🟡 Monitoruj
Obejście uwierzytelnienia w Laravel Passport pozwala na nieautoryzowane logowanie jako rzeczywisty użytkownik.
CVSS
7.1
EPSS
0.1%
Exploit
none
Vendor
Opis źródłowy (NVD)
Laravel Passport provides OAuth2 server support to Laravel. From 13.0.0 to before 13.7.1, there is an Authentication Bypass for client_credentials tokens. the league/oauth2-server library sets the JWT sub claim to the client identifier (since there's no user). The token guard then passes this value to retrieveById() without validating it's actually a user identifier, potentially resolving an unrelated real user. Any machine-to-machine token can inadvertently authenticate as an actual user. This vulnerability is fixed in 13.7.1.
auth-bypass
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.1 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-04-09 17:16:31 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-13 15:02:27 UTC |
Referencje
- https://github.com/laravel/passport/issues/1900 (security-advisories@github.com)
- https://github.com/laravel/passport/pull/1901 (security-advisories@github.com)
- https://github.com/laravel/passport/pull/1902 (security-advisories@github.com)
- https://github.com/laravel/passport/security/advisories/GHSA-349c-2h2f-mxf6 (security-advisories@github.com)
- https://github.com/thephpleague/oauth2-server/issues/1456#issuecomment-2734989996 (security-advisories@github.com)