Bug 2428102 (CVE-2025-68158) - CVE-2025-68158 Authlib: Authlib: Cross-Site Request Forgery due to improper session management in state storage
Summary: CVE-2025-68158 Authlib: Authlib: Cross-Site Request Forgery due to improper s...
Keywords:
Status: NEW
Alias: CVE-2025-68158
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-01-08 19:02 UTC by OSIDB Bzimport
Modified: 2026-01-09 04:45 UTC (History)
39 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-01-08 19:02:47 UTC
Authlib is a Python library which builds OAuth and OpenID Connect servers. In version 1.6.5 and prior, cache-backed state/request-token storage is not tied to the initiating user session, so CSRF is possible for any attacker that has a valid state (easily obtainable via an attacker-initiated authentication flow). When a cache is supplied to the OAuth client registry, FrameworkIntegration.set_state_data writes the entire state blob under _state_{app}_{state}, and get_state_data ignores the caller’s session altogether. This issue has been patched in version 1.6.6.


Note You need to log in before you can comment on or make changes to this bug.