- Status Closed
-
Assigned To
cbay - Private
Opened by ARTanvir76 - 24.02.2026
Last edited by cbay - 24.02.2026
FS#300 - 2FA Misconfig:Expired and Previously Used 2FA OTP Can Be Reused to Successfully login after logout
Summary:
The alwaysdata.com implements Time-based One-Time Password (TOTP) authentication using Google Authenticator. However, it is possible to successfully authenticate using a previously used and expired OTP code. This indicates that the system does not properly invalidate used or expired OTPs, significantly weakening the security guarantees of two-factor authentication.
Steps to Reproduce
1.Navigate to: https://admin.alwaysdata.com/login/
2.Log in using valid credentials.(must be turn on 2fa on the account)
3.When prompted for Authenticator 2FA, enter a correct OTP code and complete login successfully.
4.Copy and store the OTP used in step 3.
5.Wait until the OTP expires in Google Authenticator and a new OTP appears.
6.Log out from the account.
7.Attempt to log in again using valid credentials.
8.When prompted for 2FA, enter the previously used and expired OTP code from step 3.
9.Observe: Authentication succeeds even though the OTP is expired and already used.
PoC:video attached
Expected Behavior
An OTP code should be valid only once.Expired OTPs must be rejected.Previously used OTPs must be invalidated immediately after successful authentication.
Actual Behavior
Expired and previously used OTP codes are still accepted.Login succeeds with replayed OTP values.
Impact
This vulnerability allows attackers to bypass two-factor authentication by reusing expired and previously used OTP codes, leading to unauthorized account access and potential account takeover.
Beyond direct security impact, exploitation of this issue can cause significant reputational damage to the company. Users expect 2FA to provide strong protection; a failure in its implementation may lead users to perceive the platform as insecure, resulting in loss of user trust, reduced confidence in the service, and potential customer churn. Additionally, if exploited at scale, this could expose the company to compliance, legal, and brand credibility risks.
Recommended solution
Enforce single-use OTP validation by immediately invalidating a TOTP code after successful authentication.Strictly verify OTP expiration time and reject any expired or previously used codes on the server side.Implement replay protection and ensure TOTP validation fully complies with RFC 6238, allowing only minimal clock skew.
Loading...
Available keyboard shortcuts
- Alt + ⇧ Shift + l Login Dialog / Logout
- Alt + ⇧ Shift + a Add new task
- Alt + ⇧ Shift + m My searches
- Alt + ⇧ Shift + t focus taskid search
Tasklist
- o open selected task
- j move cursor down
- k move cursor up
Task Details
- n Next task
- p Previous task
- Alt + ⇧ Shift + e ↵ Enter Edit this task
- Alt + ⇧ Shift + w watch task
- Alt + ⇧ Shift + y Close Task
Task Editing
- Alt + ⇧ Shift + s save task
2026-02-24 17-13-44.mp4