Security vulnerabilities

  • Status Closed
  • Assigned To
    cbay
  • Private
Attached to Project: Security vulnerabilities
Opened by monty099 - 25.10.2025
Last edited by cbay - 27.10.2025

FS#233 - Title: Session persists after unlinking Google OAuth

Description: After unlinking Google from a user's account, previously created sessions via Google remain active and are not terminated.

Steps to reproduce:

1. Browser A: Sign in to the account via Google OAuth. Keep the session.

2. Browser B: Sign in to the same account using email/password.

3. From Browser B, go to account settings and unlink Google.

4. Return to Browser A and notice that the session was not terminated.

POC: https://admin.alwaysdata.com/support/90046/

Impact:
An attacker who possesses a previous session via Google remains able to access the account even after the owner believes they have unlinked it — leading to persistent unauthorized access.

Suggestion for fix:

Force immediate logout from all sessions associated with the OAuth provider.

Closed by  cbay
27.10.2025 08:19
Reason for closing:  Duplicate
Additional comments about closing:  

https://security.alwaysda ta.com/task/225

Loading...

Available keyboard shortcuts

Tasklist

Task Details

Task Editing