Vulnerability DatabaseGHSA-9wgg-m99q-hhfc

GHSA-9wgg-m99q-hhfc
Python vulnerability analysis and mitigation

Overview

A high severity vulnerability (GHSA-9wgg-m99q-hhfc) was discovered in the email-oauth2-proxy package affecting versions <= 2023.11.18. The vulnerability allowed expired OAuth 2.0 client credentials grant (CCG) flow authorization tokens to be renewed automatically without validating against the original account configuration. The issue was present from September 5, 2022 (commit 8c874c2) until it was patched in version 2023.12.19. The vulnerability has a CVSS score of 8.1, indicating high severity (GitHub Advisory).

Technical details

The vulnerability stems from the proxy's token retrieval implementation, which was originally designed for interactive processes. When CCG tokens approached their expiry date or had expired, and the original unencrypted client_secret value was available, they were automatically reset and renewed without verifying the password's ability to decrypt the existing token. This issue specifically affects the OAuth 2.0 client credentials grant (CCG) flow, which is an administrator-level method that grants broad access without user interaction or remote account password verification (GitHub Advisory).

Impact

An attacker with knowledge of valid account addresses could potentially gain unauthorized access to accounts by timing their login attempts within 10 minutes prior to token expiry and before a legitimate login request. This impact is particularly significant in publicly-accessible deployments where the proxy is available from the internet or across a network. The vulnerability affects confidentiality and integrity with high severity, though availability remains unaffected (GitHub Advisory).

Mitigation and workarounds

Users should upgrade to version 2023.12.19 or later which contains the fix. For those using the CCG flow, setting encrypt_client_secret_on_first_use = True and removing the original client_secret value from the proxy's configuration file provides protection against this vulnerability. The issue does not affect normal interactive account authentication or ROPCG flow users (GitHub Release).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23949HIGH8.6
  • PythonPython
  • jaraco.context
NoYesJan 20, 2026
CVE-2026-22219HIGH8.3
  • PythonPython
  • chainlit
NoYesJan 20, 2026
CVE-2026-23842HIGH7.5
  • PythonPython
  • chatterbot
NoYesJan 19, 2026
CVE-2026-23877MEDIUM5.3
  • PythonPython
  • swingmusic
NoYesJan 19, 2026
CVE-2026-23833LOW1.7
  • PythonPython
  • esphome
NoYesJan 19, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management