CVE-2026-28512
Impact
A flaw in callback URL validation allowed crafted redirect_uri values containing URL userinfo (@) to bypass legitimate callback pattern checks. If an attacker can trick a user into opening a malicious authorization link, the authorization code may be redirected to an attacker-controlled host.
Patches
Fixed in v2.3.1 (commit 3a339e33191c31b68bf57db907f800d9de5ffbc8).
The fix replaces delimiter-based callback matching with structured URL pattern matching and updates validation logic/tests.
Workarounds
- Reject callback URLs containing userinfo (
@) at reverse proxy / app policy level if feasible.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/pocket-id/pocket-id/security/advisories/GHSA-9h33-g3ww-mqff, https://nvd.nist.gov/vuln/detail/CVE-2026-28512, https://github.com/pocket-id/pocket-id/commit/3a339e33191c31b68bf57db907f800d9de5ffbc8, https://github.com/pocket-id/pocket-id
