Back
Critical · CVSS 9.8Improper Access Control - Generic (CWE-284) PRO

Unauthenticated OAuth Token Leading to Access to Protected APIs

Vulnerability Summary

What started as a simple JavaScript analysis ended in a broken OAuth flow that allowed unauthenticated access to protected APIs — and a €1500 bug bounty reward.

Summary

Identification Required

You must be logged in to read this writeup. Join our community of researchers today.

Related Writeups

Discussion

No comments yet. Be the first to share your thoughts.

Log in to join the discussion.

Sign In