Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3432: CWE-862 Missing Authorization in SimStudioAI sim

0
Critical
VulnerabilityCVE-2026-3432cvecve-2026-3432cwe-862
Published: Mon Mar 02 2026 (03/02/2026, 13:01:05 UTC)
Source: CVE Database V5
Vendor/Project: SimStudioAI
Product: sim

Description

On SimStudio version below to 0.5.74, the `/api/auth/oauth/token` endpoint contains a code path that bypasses all authorization checks when provided with `credentialAccountUserId` and `providerId` parameters. An unauthenticated attacker can retrieve OAuth access tokens for any user by supplying their user ID and a provider name, effectively stealing credentials to third-party services.

AI-Powered Analysis

AILast updated: 03/02/2026, 13:55:39 UTC

Technical Analysis

CVE-2026-3432 is a critical security vulnerability identified in SimStudioAI's sim product, specifically affecting versions below 0.5.74. The vulnerability stems from a missing authorization check (CWE-862) in the /api/auth/oauth/token API endpoint. When an attacker provides the parameters credentialAccountUserId and providerId, the endpoint bypasses all authorization mechanisms and returns OAuth access tokens associated with the specified user ID and provider. This flaw allows an unauthenticated attacker to impersonate any user and gain unauthorized access to third-party services linked via OAuth tokens. The vulnerability is severe due to its ease of exploitation: no authentication or user interaction is required, and the attack surface is exposed via a publicly accessible API endpoint. The CVSS 4.0 base score of 9.3 reflects the high impact on confidentiality and integrity, as attackers can steal sensitive credentials and potentially manipulate or access external services on behalf of victims. Although no public exploits have been reported yet, the critical nature of this flaw demands immediate attention. The vulnerability affects all versions prior to 0.5.74, and no official patches or mitigations have been linked yet, increasing the urgency for organizations to apply vendor updates once available or implement compensating controls.

Potential Impact

The impact of CVE-2026-3432 is substantial for organizations using vulnerable versions of SimStudioAI's sim product. An attacker exploiting this vulnerability can obtain OAuth tokens for any user without authentication, leading to unauthorized access to third-party services integrated via OAuth. This can result in data breaches, unauthorized transactions, service disruptions, and lateral movement within an organization's cloud or SaaS environments. The compromise of OAuth tokens undermines the confidentiality and integrity of user accounts and connected services, potentially exposing sensitive business data or enabling further attacks. Given the critical CVSS score and the lack of required authentication, the vulnerability poses a high risk to organizations relying on SimStudioAI for AI and cloud-based workflows. The absence of known exploits in the wild currently limits immediate widespread damage, but the vulnerability's characteristics make it a prime target for attackers once exploit code becomes available. Organizations may face regulatory and reputational damage if user credentials and third-party integrations are compromised.

Mitigation Recommendations

To mitigate CVE-2026-3432, organizations should immediately upgrade SimStudioAI sim to version 0.5.74 or later once the vendor releases a patch addressing the missing authorization check. Until a patch is available, organizations should implement strict network-level access controls to restrict access to the /api/auth/oauth/token endpoint, limiting it to trusted internal IP addresses or VPN users only. Employ API gateways or web application firewalls (WAFs) with custom rules to detect and block requests containing suspicious credentialAccountUserId and providerId parameters. Conduct thorough audits of OAuth token issuance logs to detect anomalous token retrieval patterns. Additionally, enforce multi-factor authentication (MFA) on third-party services where possible to reduce the impact of stolen tokens. Review and rotate OAuth tokens and credentials periodically to limit token lifetime exposure. Finally, monitor threat intelligence feeds for any emerging exploit code targeting this vulnerability and prepare incident response plans accordingly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
tenable
Date Reserved
2026-03-02T12:42:30.208Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a5937832ffcdb8a228be36

Added to database: 3/2/2026, 1:41:12 PM

Last enriched: 3/2/2026, 1:55:39 PM

Last updated: 3/2/2026, 10:16:40 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses