Vulnerability Description
Tinyauth is an authentication and authorization server. Prior to 5.0.3, the OIDC authorization endpoint allows users with a TOTP-pending session (password verified, TOTP not yet completed) to obtain authorization codes. An attacker who knows a user's password but not their TOTP secret can obtain valid OIDC tokens, completely bypassing the second factor. This vulnerability is fixed in 5.0.3.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tinyauth | Tinyauth | <= 5.0.2 |
Related Weaknesses (CWE)
References
- https://github.com/steveiliop56/tinyauth/security/advisories/GHSA-3q28-qjrv-qr39ExploitThird Party Advisory
FAQ
What is CVE-2026-32246?
CVE-2026-32246 is a vulnerability with a CVSS score of 8.5 (HIGH). Tinyauth is an authentication and authorization server. Prior to 5.0.3, the OIDC authorization endpoint allows users with a TOTP-pending session (password verified, TOTP not yet completed) to obtain a...
How severe is CVE-2026-32246?
CVE-2026-32246 has been rated HIGH with a CVSS base score of 8.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-32246?
Check the references section above for vendor advisories and patch information. Affected products include: Tinyauth Tinyauth.