Description
Feathersjs is a framework for creating web APIs and real-time applications with TypeScript or JavaScript. From 5.0.0 to before 5.0.42, an unauthenticated attacker can send a crafted GET request directly to /oauth/:provider/callback with a forged profile in the query string. The OAuth service's authentication payload has a fallback chain that reaches params.query (the raw request query) when Grant's session/state responses are empty. Since the attacker never initiated an OAuth authorize flow, Grant has no session to work with and produces no response, so the fallback fires. The forged profile then drives entity lookup and JWT minting. The attacker gets a valid access token for an existing user without ever contacting the OAuth provider. This vulnerability is fixed in 5.0.42.
INFO
Published Date :
2026-03-10T20:06:34.801Z
Last Modified :
2026-03-11T14:10:22.938Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-29792 vulnerability.
| Vendors | Products |
|---|---|
| Feathersjs |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-29792.