Pocket ID: OAuth redirect_uri validation bypass via userinfo/host confusion
Package
Affected versions
< 0.0.0-20260228130835-3a339e33191c
Patched versions
0.0.0-20260228130835-3a339e33191c
Description
Published to the GitHub Advisory Database
Mar 9, 2026
Reviewed
Mar 9, 2026
Published by the National Vulnerability Database
Mar 10, 2026
Last updated
Mar 10, 2026
Impact
A flaw in callback URL validation allowed crafted
redirect_urivalues containing URL userinfo (@) to bypass legitimate callback pattern checks. If an attacker can trick a user into opening a malicious authorization link, the authorization code may be redirected to an attacker-controlled host.Patches
Fixed in
v2.3.1(commit 3a339e33191c31b68bf57db907f800d9de5ffbc8).The fix replaces delimiter-based callback matching with structured URL pattern matching and updates validation logic/tests.
Workarounds
@) at reverse proxy / app policy level if feasible.References