Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29792: CWE-287: Improper Authentication in feathersjs feathers

0
Critical
VulnerabilityCVE-2026-29792cvecve-2026-29792cwe-287
Published: Tue Mar 10 2026 (03/10/2026, 20:06:34 UTC)
Source: CVE Database V5
Vendor/Project: feathersjs
Product: feathers

Description

Feathersjs is a framework for creating web APIs and real-time applications with TypeScript or JavaScript. From 5.0.0 to before 5.0.42, an unauthenticated attacker can send a crafted GET request directly to /oauth/:provider/callback with a forged profile in the query string. The OAuth service's authentication payload has a fallback chain that reaches params.query (the raw request query) when Grant's session/state responses are empty. Since the attacker never initiated an OAuth authorize flow, Grant has no session to work with and produces no response, so the fallback fires. The forged profile then drives entity lookup and JWT minting. The attacker gets a valid access token for an existing user without ever contacting the OAuth provider. This vulnerability is fixed in 5.0.42.

AI-Powered Analysis

AILast updated: 03/11/2026, 14:44:27 UTC

Technical Analysis

Feathersjs is a popular framework for building web APIs and real-time applications using JavaScript or TypeScript. Between versions 5.0.0 and before 5.0.42, it contains a critical improper authentication vulnerability (CWE-287) identified as CVE-2026-29792. The flaw arises in the OAuth authentication flow, specifically in the /oauth/:provider/callback endpoint. Normally, OAuth authentication involves a multi-step process where the client initiates an authorization request, the OAuth provider authenticates the user, and then redirects back with a valid authorization code or token. However, in the vulnerable versions, if an attacker sends a crafted GET request directly to the callback endpoint with a forged user profile embedded in the query string, the OAuth service's authentication payload falls back to using params.query when the Grant library's session or state responses are empty. Since the attacker never initiated an OAuth authorization flow, no session exists, causing Grant to produce no response and triggering the fallback. This fallback allows the attacker-supplied forged profile to be used for entity lookup and JWT token minting. Consequently, the attacker obtains a valid access token for an existing user without any interaction with the legitimate OAuth provider, effectively bypassing authentication controls. This vulnerability enables unauthorized access to user accounts and any resources protected by the compromised tokens. The issue was addressed and fixed in Feathersjs version 5.0.42. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality and integrity. No public exploits have been reported yet, but the critical severity and ease of exploitation make this a high-risk vulnerability for affected deployments.

Potential Impact

The impact of CVE-2026-29792 is severe for organizations using vulnerable versions of Feathersjs in their web APIs or real-time applications. Attackers can impersonate any existing user without needing credentials or interaction with the legitimate OAuth provider, leading to unauthorized access to sensitive data and functionality. This can result in data breaches, privilege escalation, and compromise of application integrity. Since JWT tokens minted by the attacker are valid, they can bypass normal authentication and authorization checks, potentially accessing confidential user information, modifying data, or performing actions on behalf of the victim user. The vulnerability affects all deployments using the affected Feathersjs versions with OAuth authentication enabled, which may include startups, SaaS providers, and enterprises relying on this framework. The ease of exploitation over the network without authentication or user interaction increases the risk of automated attacks and widespread compromise. Organizations may face regulatory, reputational, and operational consequences if exploited.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade Feathersjs to version 5.0.42 or later, where the issue is fixed. If upgrading is not immediately possible, implement strict input validation and sanitization on the /oauth/:provider/callback endpoint to reject any requests containing forged or unexpected query parameters. Disable or restrict direct access to the OAuth callback endpoint from untrusted sources. Review and harden the OAuth integration to ensure that the authentication flow strictly requires valid session or state parameters before minting tokens. Employ additional monitoring and anomaly detection on OAuth callback requests to identify suspicious patterns indicative of exploitation attempts. Consider implementing multi-factor authentication (MFA) to reduce the impact of compromised tokens. Finally, audit logs for any unauthorized access and revoke any suspicious tokens issued prior to patching.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-04T16:26:02.900Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b17c642f860ef943f8b125

Added to database: 3/11/2026, 2:29:56 PM

Last enriched: 3/11/2026, 2:44:27 PM

Last updated: 3/13/2026, 11:20:01 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses