Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32246: CWE-287: Improper Authentication in steveiliop56 tinyauth

0
High
VulnerabilityCVE-2026-32246cvecve-2026-32246cwe-287
Published: Thu Mar 12 2026 (03/12/2026, 18:59:20 UTC)
Source: CVE Database V5
Vendor/Project: steveiliop56
Product: tinyauth

Description

CVE-2026-32246 is a high-severity authentication bypass vulnerability in the Tinyauth authentication and authorization server prior to version 5. 0. 3. The flaw exists in the OIDC authorization endpoint, which improperly allows users with a TOTP-pending session—where the password is verified but the second factor (TOTP) is not yet completed—to obtain valid authorization codes. This enables an attacker who knows a user's password but not their TOTP secret to bypass the second factor and gain unauthorized access via valid OIDC tokens. The vulnerability affects all Tinyauth versions before 5. 0. 3 and has a CVSS score of 8. 5, indicating a high impact on integrity and moderate impact on confidentiality. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 03/12/2026, 21:14:29 UTC

Technical Analysis

CVE-2026-32246 is an improper authentication vulnerability (CWE-287) discovered in the Tinyauth authentication and authorization server, specifically affecting versions prior to 5.0.3. Tinyauth implements OpenID Connect (OIDC) for authentication flows, including multi-factor authentication (MFA) using Time-based One-Time Passwords (TOTP). The vulnerability arises because the OIDC authorization endpoint incorrectly issues authorization codes to sessions where the user has successfully verified their password but has not completed the TOTP verification step. This means that an attacker who has compromised or otherwise obtained a user's password can bypass the second factor entirely by exploiting the authorization endpoint to obtain valid OIDC tokens. These tokens can then be used to access protected resources, effectively compromising the integrity of the authentication process. The vulnerability does not require user interaction and can be exploited remotely with low complexity, but requires the attacker to have the user's password (privilege required). The scope is high since it affects the authentication mechanism and can lead to full account takeover without completing the second factor. The issue was addressed in Tinyauth version 5.0.3 by correcting the authorization endpoint logic to enforce completion of TOTP verification before issuing authorization codes. No public exploits have been reported yet, but the vulnerability poses a significant risk to any organization using vulnerable versions of Tinyauth for MFA enforcement.

Potential Impact

This vulnerability severely undermines the security guarantees of multi-factor authentication in Tinyauth deployments, allowing attackers who have obtained user passwords to bypass the second factor and gain unauthorized access. The impact includes potential account takeover, unauthorized access to sensitive systems and data, and possible lateral movement within affected networks. Organizations relying on Tinyauth for critical authentication services could face data breaches, compliance violations, and reputational damage. Since Tinyauth is an authentication server, compromise can affect multiple dependent applications and services, amplifying the impact. The vulnerability does not affect availability but compromises integrity and confidentiality. The ease of exploitation (no user interaction, remote network attack vector) combined with the high scope and impact makes this a critical risk for organizations using vulnerable versions.

Mitigation Recommendations

The primary mitigation is to upgrade all Tinyauth deployments to version 5.0.3 or later, where the vulnerability is fixed. Organizations should immediately audit their authentication infrastructure to identify any instances running vulnerable versions. Additionally, implement compensating controls such as monitoring and alerting on anomalous authorization code requests or unusual token issuance patterns. Enforce strong password policies and consider additional layers of security such as device-based authentication or behavioral analytics to detect suspicious access attempts. Review and tighten access controls on the Tinyauth server itself to limit exposure. Conduct thorough incident response readiness in case of suspected compromise. Finally, ensure that all dependent applications validate tokens properly and consider implementing short token lifetimes to limit the window of misuse.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-11T14:47:05.685Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b3294c2f860ef943f62df7

Added to database: 3/12/2026, 8:59:56 PM

Last enriched: 3/12/2026, 9:14:29 PM

Last updated: 3/12/2026, 10:35:42 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses