View online: https://www.drupal.org/sa-contrib-2025-114
Project: Simple OAuth (OAuth2) & OpenID Connect [1] Date: 2025-October-29 Security risk: *Critical* 15 ∕ 25 AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:All [2] Vulnerability: Access bypass
Affected versions: <6.0.7 CVE IDs: CVE-2025-12466 Description: This module introduces an OAuth 2.0 authorization server, which can be configured to protect your Drupal instance with access tokens, or allow clients to request new access tokens and refresh them.
The module doesn't sufficiently respect granted scopes, it affects all access checks that are based on roles. For example: routes that have the _role requirement, can be bypassed with an access token.
This vulnerability is mitigated by the fact that an attacker must have the access token in possession and the user related to the token must have the associated (role requirement) roles assigned.
Solution: Install the latest version:
* If you use the "Simple OAuth (OAuth2) & OpenID Connect" module for Drupal, upgrade to Simple OAuth (OAuth2) & OpenID Connect 6.0.7 [3]
Reported By: * coffeemakr [4]
Fixed By: * Bojan Bogdanovic (bojan_dev) [5] * coffeemakr [6] * Juraj Nemec (poker10) [7] of the Drupal Security Team
Coordinated By: * Greg Knaddison (greggles) [8] of the Drupal Security Team * Juraj Nemec (poker10) [9] of the Drupal Security Team
------------------------------------------------------------------------------ Contribution record [10]
[1] https://www.drupal.org/project/simple_oauth [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/simple_oauth/releases/6.0.7 [4] https://www.drupal.org/u/coffeemakr [5] https://www.drupal.org/u/bojan_dev [6] https://www.drupal.org/u/coffeemakr [7] https://www.drupal.org/u/poker10 [8] https://www.drupal.org/u/greggles [9] https://www.drupal.org/u/poker10 [10] https://new.drupal.org/contribution-record?source_link=https%3A//www.drupal....