On SimStudio version below to 0.5.74, the `/api/auth/oauth/token` endpoint contains a code path that bypasses all authorization checks when provided with `credentialAccountUserId` and `providerId` parameters. An unauthenticated attacker can retrieve OAuth access tokens for any user by supplying their user ID and a provider name, effectively stealing credentials to third-party services.
History

Mon, 02 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Description On SimStudio version below to 0.5.74, the `/api/auth/oauth/token` endpoint contains a code path that bypasses all authorization checks when provided with `credentialAccountUserId` and `providerId` parameters. An unauthenticated attacker can retrieve OAuth access tokens for any user by supplying their user ID and a provider name, effectively stealing credentials to third-party services.
Title Sim Studio AI - Unauthenticated OAuth Token Theft
Weaknesses CWE-862
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: tenable

Published:

Updated: 2026-03-02T13:32:11.796Z

Reserved: 2026-03-02T12:42:30.208Z

Link: CVE-2026-3432

cve-icon Vulnrichment

Updated: 2026-03-02T13:32:08.295Z

cve-icon NVD

Status : Received

Published: 2026-03-02T13:16:05.367

Modified: 2026-03-02T13:16:05.367

Link: CVE-2026-3432

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.