<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Oauth — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/oauth/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 21:25:44 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/oauth/feed.xml" rel="self" type="application/rss+xml"/><item><title>n8n MCP OAuth Client XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-n8n-xss-oauth/</link><pubDate>Wed, 29 Apr 2026 21:25:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-n8n-xss-oauth/</guid><description>n8n is vulnerable to cross-site scripting (XSS) via a malicious MCP OAuth client, allowing an unauthenticated attacker to inject arbitrary JavaScript into an authenticated user's session.</description><content:encoded><![CDATA[<p>n8n, a workflow automation platform, is susceptible to a cross-site scripting (XSS) vulnerability (CVE-2026-42235) related to the registration of malicious MCP OAuth clients. An unauthenticated attacker can register an OAuth client with a crafted <code>client_name</code> containing malicious JavaScript. This vulnerability exists in versions prior to 2.14.2 and also affects versions 2.17.0 to 2.17.3 and 2.18.0. A successful exploit allows the attacker to execute arbitrary JavaScript within a victim&rsquo;s authenticated n8n session, potentially leading to credential theft, session token theft, workflow manipulation, or privilege escalation. Defenders should prioritize patching to version 2.14.2 or later to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker registers a malicious MCP OAuth client with a crafted <code>client_name</code> containing XSS payload.</li>
<li>A victim user navigates to the n8n instance and is presented with the malicious OAuth consent dialog.</li>
<li>The victim user authorizes the malicious OAuth client, unknowingly injecting the attacker&rsquo;s script into their session.</li>
<li>A second user, possibly an administrator, revokes the OAuth access granted to the malicious client.</li>
<li>This revocation triggers a toast notification to the original victim user.</li>
<li>The toast notification renders the attacker&rsquo;s injected script from the crafted <code>client_name</code>.</li>
<li>The victim user clicks on the link within the toast notification.</li>
<li>The injected JavaScript executes within the victim&rsquo;s authenticated n8n browser session, enabling the attacker to perform malicious actions such as stealing credentials, manipulating workflows, or escalating privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this XSS vulnerability can lead to significant compromise of an n8n instance. Attackers can steal user credentials and session tokens, allowing them to impersonate legitimate users. Malicious actors could also modify or create workflows, leading to data breaches, system disruption, or unauthorized access. Privilege escalation is also possible, potentially granting attackers administrative control over the n8n platform. The number of potential victims depends on the exposure and user base of the vulnerable n8n instances.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade n8n to version 2.14.2 or later to patch CVE-2026-42235, as recommended in the advisory.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious n8n MCP OAuth Client Registration</code> to identify attempts to register OAuth clients with suspicious names.</li>
<li>If immediate patching is not feasible, restrict access to the n8n instance and the MCP OAuth registration endpoint to trusted users only, as suggested in the advisory&rsquo;s workaround.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xss</category><category>oauth</category><category>n8n</category><category>CVE-2026-42235</category></item><item><title>Large-Scale OAuth Device Code Phishing Campaign Observed in April 2026</title><link>https://feed.craftedsignal.io/briefs/2026-05-oauth-device-code-phishing/</link><pubDate>Fri, 24 Apr 2026 19:52:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-oauth-device-code-phishing/</guid><description>In early April 2026, Arctic Wolf tracked a large-scale device code phishing campaign across multiple regions and sectors where threat actors abused OAuth device code flow to trick victims into providing authentication codes.</description><content:encoded><![CDATA[<p>In early April 2026, Arctic Wolf observed a widespread phishing campaign that abused the OAuth device code flow. This campaign targeted organizations across multiple regions and sectors, mirroring the &ldquo;Riding the Rails&rdquo; campaign observed by Huntress in late March. The attackers exploited the device code grant type in the OAuth 2.0 authorization framework to obtain access tokens. By tricking users into entering a code on a legitimate Microsoft login page, attackers bypassed traditional MFA controls. Defenders should be aware of this evolving technique and implement detection strategies focused on anomalous application registrations and device code flow activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a phishing email to the victim, impersonating a legitimate service.</li>
<li>The email contains a link that redirects the victim to a fake application authorization page.</li>
<li>The fake page prompts the victim to enter a device code.</li>
<li>Unbeknownst to the victim, the device code is associated with a malicious OAuth application controlled by the attacker.</li>
<li>The victim is redirected to a legitimate Microsoft login page, where they enter the provided code and authenticate.</li>
<li>Upon successful authentication, the malicious application receives an access token.</li>
<li>The attacker uses the access token to access the victim&rsquo;s account and sensitive data.</li>
<li>The attacker may then perform actions such as reading emails, accessing files, or initiating further malicious activity within the compromised account.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This OAuth device code phishing campaign affected numerous organizations across multiple sectors and regions in early April 2026. Successful attacks grant threat actors unauthorized access to user accounts, potentially leading to data exfiltration, financial fraud, and further compromise of internal systems. Due to the nature of OAuth, attackers can maintain persistent access even after password changes, posing a significant long-term risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Azure AD sign-in logs for device code flow usage to identify suspicious authentications (logsource: azuread, category: authentication).</li>
<li>Implement the Sigma rule provided below to detect suspicious application registrations in Azure AD (logsource: o365, category: configuration).</li>
<li>Educate users on the risks of device code phishing and how to identify malicious authorization requests.</li>
<li>Regularly audit OAuth applications authorized within your environment and revoke access for any suspicious or unused applications.</li>
<li>Investigate any alerts related to anomalous OAuth application activity promptly.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>oauth</category><category>device-code</category><category>phishing</category><category>initial-access</category></item><item><title>Better Auth OAuth Provider Authorization Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-better-auth-oauth-bypass/</link><pubDate>Fri, 17 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-better-auth-oauth-bypass/</guid><description>An authorization bypass vulnerability exists in Better Auth's OAuth provider, allowing low-privilege users to create OAuth clients despite configured clientPrivileges, potentially leading to unauthorized client registration and increased phishing risks.</description><content:encoded><![CDATA[<p>An authorization bypass vulnerability affects the OAuth provider component of Better Auth, specifically versions 1.4.8-beta.7 through 1.6.4 and 1.7.0-beta.0 through 1.7.0-beta.1. This flaw allows any authenticated, low-privilege user to create OAuth clients, bypassing the intended restrictions set by the <code>clientPrivileges</code> configuration. The vulnerability stems from the client creation endpoints (<code>adminCreateOAuthClient</code> and <code>createOAuthClient</code>) not enforcing the <code>clientPrivileges</code> check before creating new OAuth clients. This bypass allows attackers to register OAuth clients with attacker-controlled redirect URIs and metadata, potentially leading to phishing attacks and abuse of trust assumptions in OAuth/OIDC flows. Defenders should implement detections to identify unauthorized OAuth client creation attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Better Auth application with a low-privilege account.</li>
<li>The attacker crafts a POST request to either <code>/api/auth/oauth2/create-client</code> or a custom endpoint that routes to <code>adminCreateOAuthClient</code>.</li>
<li>The attacker includes parameters for <code>client_name</code>, <code>redirect_uris</code>, and other client metadata within the POST request body.</li>
<li>The <code>createOAuthClientEndpoint</code> function is called without first performing a <code>clientPrivileges</code> authorization check.</li>
<li>A new OAuth client is created and persisted in the system.</li>
<li>The attacker now controls a registered OAuth client with attacker-defined redirect URIs.</li>
<li>The attacker can potentially use this client for phishing attacks or to bypass consent flows if <code>skip_consent</code> is enabled (if <code>adminCreateOAuthClient</code> is exposed).</li>
<li>The attacker exploits the newly created OAuth client to gain unauthorized access to resources or user data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows unauthorized users to create OAuth clients, potentially leading to several negative consequences. Attackers can register clients with malicious redirect URIs, which can be used in phishing campaigns to steal user credentials or OAuth tokens. In scenarios where the <code>adminCreateOAuthClient</code> endpoint is exposed, attackers can create clients that bypass user consent, further increasing the risk of successful attacks. The impact is significant because it breaks the intended access control mechanism of the <code>clientPrivileges</code> configuration, affecting applications that rely on it to restrict client registration. Successful exploitation can lead to unauthorized access to user data, compromised accounts, and damaged trust in the application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for POST requests to the <code>/api/auth/oauth2/create-client</code> endpoint, especially from users who should not have client creation privileges. Implement the &ldquo;Detect Unauthorized OAuth Client Creation Attempt&rdquo; Sigma rule below, using webserver logs (category: &ldquo;webserver&rdquo;, product: &ldquo;linux&rdquo;).</li>
<li>Apply the necessary patches to upgrade <code>@better-auth/oauth-provider</code> to a version that addresses this vulnerability (&gt;= 1.6.5 or &gt;= 1.7.0-beta.2).</li>
<li>Audit your application&rsquo;s OAuth client registration process to ensure that the <code>clientPrivileges</code> check is enforced correctly.</li>
<li>If using <code>adminCreateOAuthClient</code>, ensure it is not exposed to low-privilege authenticated users to prevent the <code>skip_consent</code> bypass.</li>
<li>Deploy the &ldquo;Detect OAuth Client Creation with Skip Consent&rdquo; Sigma rule if your deployment exposes the admin client creation endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>oauth</category><category>authorization</category><category>bypass</category><category>privilege-escalation</category><category>defense-evasion</category></item><item><title>Entra ID ADRS Token Request by Microsoft Authentication Broker</title><link>https://feed.craftedsignal.io/briefs/2026-06-adrs-token-request/</link><pubDate>Fri, 10 Apr 2026 17:57:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-adrs-token-request/</guid><description>Detects suspicious OAuth 2.0 token requests where the Microsoft Authentication Broker requests access to the Device Registration Service on behalf of a user principal, potentially indicating an attempt to abuse device registration for unauthorized persistence.</description><content:encoded><![CDATA[<p>This detection identifies potentially malicious activity within Microsoft Entra ID (Azure AD) involving the Microsoft Authentication Broker (MAB). Specifically, it focuses on OAuth 2.0 token requests where MAB (application ID 29d9ed98-a469-4536-ade2-f981bc1d605e) requests access to the Device Registration Service (DRS) (resource ID 01cb2876-7ebd-4aa4-9cc9-d28bd4d359a9) on behalf of a user. The presence of the <code>adrs_access</code> scope within the authentication processing details signals an attempt to interact with the ADRS (Azure Device Registration Service), an action not typically associated with standard user sign-ins. This behavior could indicate an attacker attempting to abuse device registration mechanisms to achieve persistence, such as acquiring a Primary Refresh Token (PRT) or establishing a trusted session. The Volexity report from April 2025 highlights similar OAuth workflow targeting.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises user credentials through phishing or other means.</li>
<li>Attacker leverages the compromised credentials to initiate an OAuth 2.0 authentication flow.</li>
<li>The Microsoft Authentication Broker is used to request an access token.</li>
<li>The request targets the Device Registration Service (DRS) with resource ID 01cb2876-7ebd-4aa4-9cc9-d28bd4d359a9.</li>
<li>The OAuth scope includes <code>adrs_access</code>, indicating an attempt to access ADRS functionalities.</li>
<li>The request is made using a refresh token, suggesting an attempt to establish persistent access.</li>
<li>Successful token acquisition allows the attacker to manipulate device registration or acquire a Primary Refresh Token (PRT).</li>
<li>The attacker uses the PRT or device registration to maintain unauthorized access to resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could allow an attacker to maintain persistent access to an organization&rsquo;s cloud resources, even after a user changes their password or is removed from the organization. This can lead to data exfiltration, lateral movement, and further compromise of sensitive information. The number of potentially affected users depends on the scope of the initial compromise and the effectiveness of the attacker&rsquo;s persistence mechanisms. This attack targets any organization using Microsoft Entra ID.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Entra ID ADRS Token Request by Microsoft Authentication Broker&rdquo; to your SIEM and tune it for your environment to detect suspicious ADRS access attempts.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the user principal and the origin of the request.</li>
<li>Review Conditional Access policies to ensure they are sufficient to prevent unauthorized access to sensitive resources.</li>
<li>Monitor Entra ID audit logs for device registrations or changes to user&rsquo;s device registration status as suggested in the rule&rsquo;s triage steps.</li>
<li>Correlate with primary refresh token (PRTs) usage for the same user and/or session ID to identify any potential abuse, as mentioned in the rule&rsquo;s triage.</li>
<li>Consider adjusting the rule or adding exceptions for specific applications or user accounts that legitimately require access to the Device Registration Service, based on false positive analysis.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>entra_id</category><category>persistence</category><category>oauth</category></item><item><title>Device Code Phishing Campaign Targeting Cloud Platforms</title><link>https://feed.craftedsignal.io/briefs/2026-03-device-code-phishing/</link><pubDate>Wed, 25 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-device-code-phishing/</guid><description>A phishing campaign abuses Microsoft's Device Code OAuth flow to gain access to cloud-based file storage and document workflow platforms, bypassing traditional credential harvesting.</description><content:encoded><![CDATA[<p>An active phishing campaign is leveraging Microsoft&rsquo;s Device Code OAuth flow to target users of cloud-based file storage and document workflow platforms. Unlike traditional phishing attacks that aim to steal usernames and passwords directly, this campaign exploits a legitimate authentication mechanism to gain unauthorized access. The campaign impersonates popular cloud services, enticing users to enter a provided device code on a Microsoft login page. By doing so, victims inadvertently grant the attacker access to their accounts on the targeted platforms. This campaign highlights the evolving tactics of phishing actors and the need for robust detection mechanisms beyond simple credential harvesting alerts. The scope and scale of the campaign are currently unknown.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a phishing email impersonating a cloud-based file storage or document workflow service.</li>
<li>The email contains a message prompting the user to &ldquo;activate&rdquo; or &ldquo;authenticate&rdquo; their account.</li>
<li>The email includes a device code and instructs the user to visit a Microsoft login page (e.g., microsoft.com/devicelogin).</li>
<li>The user, believing the request is legitimate, enters the provided device code on the Microsoft login page.</li>
<li>The Microsoft login page prompts the user to grant permissions to an application controlled by the attacker.</li>
<li>If the user approves the permissions, the attacker gains OAuth tokens that allow access to the user&rsquo;s account on the targeted cloud platform.</li>
<li>The attacker can then access, modify, or exfiltrate data stored on the compromised account.</li>
<li>The attacker may use the compromised account to further propagate the phishing campaign to other users within the organization.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful attacks can lead to unauthorized access to sensitive data stored in cloud-based file storage and document workflow platforms. This can result in data breaches, financial loss, and reputational damage for affected organizations. The use of a legitimate Microsoft authentication flow makes this campaign difficult to detect with traditional phishing detection methods. The lack of credential harvesting may also bypass security controls focused on monitoring password theft. The specific number of victims and sectors targeted remains unknown, but the potential impact is significant given the widespread use of cloud services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement user awareness training to educate employees about device code phishing and the risks of entering unknown codes on login pages.</li>
<li>Monitor Microsoft Entra ID (Azure AD) logs for unusual device code authentication patterns, focusing on applications requesting broad permissions (reference: Attack Chain steps 5 and 6). Deploy the &ldquo;Detect Suspicious Device Code Authentication&rdquo; Sigma rule to identify anomalous activity.</li>
<li>Implement Conditional Access policies in Microsoft Entra ID to restrict device code authentication to trusted devices and locations.</li>
<li>Investigate any successful device code authentications where the application requesting permissions is not recognized or approved by the organization.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>initial-access</category><category>phishing</category><category>oauth</category></item><item><title>Patreon OAuth Provider ID Collision Vulnerability in go-pkgz/auth</title><link>https://feed.craftedsignal.io/briefs/2024-01-patreon-auth-id-collision/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-patreon-auth-id-collision/</guid><description>The Patreon OAuth provider in go-pkgz/auth and go-pkgz/auth/v2 maps every authenticated Patreon account to the same local user ID, leading to cross-account access, privilege confusion, and subscription-state leakage.</description><content:encoded><![CDATA[<p>A critical vulnerability exists in the Patreon OAuth provider within the <code>go-pkgz/auth</code> and <code>go-pkgz/auth/v2</code> libraries. Specifically, the <code>mapUser</code> function incorrectly maps all authenticated Patreon accounts to the same local <code>user.ID</code>, instead of generating unique IDs based on the Patreon account data. This flaw, present in versions 1.18.0 through 1.25.1 of <code>go-pkgz/auth</code> and 2.0.0 through 2.1.1 of <code>go-pkgz/auth/v2</code>, arises because the code hashes an uninitialized field instead of the Patreon user ID. This means that all Patreon users are effectively treated as a single identity within applications using these libraries. The vulnerability poses a significant risk to applications relying on <code>token.User.ID</code> for authentication and authorization decisions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user attempts to authenticate with an application using the affected <code>go-pkgz/auth</code> library and the Patreon OAuth provider.</li>
<li>The application redirects the user to Patreon for authentication.</li>
<li>The user authenticates with Patreon and is redirected back to the application with an authorization code.</li>
<li>The application exchanges the authorization code for an access token.</li>
<li>The application uses the access token to retrieve the user&rsquo;s Patreon profile data.</li>
<li>The application calls the vulnerable <code>mapUser</code> function within the <code>go-pkgz/auth</code> library to map the Patreon user to a local user. Due to the vulnerability, all users are mapped to the same local user ID: <code>patreon_da39a3ee5e6b4b0d3255bfef95601890afd80709</code>.</li>
<li>The application stores the mapped user object in JWT claims.</li>
<li>Subsequent requests from different Patreon users are treated as coming from the same user, potentially leading to data leakage, privilege escalation, or account takeover.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability can lead to severe consequences for applications using the affected libraries. If successful, all Patreon-authenticated users may be collapsed into a single local account. This can result in data associated with one Patreon user being exposed to or overwritten by another. Additionally, Patreon-specific attributes like subscription status can leak across unrelated users. If the application grants elevated privileges to the local account associated with the shared Patreon ID, those privileges can effectively apply to every Patreon login.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade <code>go-pkgz/auth</code> to a version higher than 1.25.1 or <code>go-pkgz/auth/v2</code> to a version higher than 2.1.1 to patch CVE-2026-42560.</li>
<li>Review and update any existing applications using the vulnerable Patreon provider to ensure proper user ID mapping after patching CVE-2026-42560.</li>
<li>Deploy the Sigma rule &ldquo;Patreon Auth ID Collision Attempt&rdquo; to detect potential exploitation by monitoring for the specific user ID pattern <code>patreon_da39a3ee5e6b4b0d3255bfef95601890afd80709</code> in authentication logs.</li>
<li>Implement additional logging and monitoring to track user authentication events and identify any anomalies in user ID assignments.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authentication</category><category>oauth</category><category>id_collision</category><category>vulnerability</category></item></channel></rss>