Sonos api.sonos.com through 2025-04-21, when the /login/v3/oauth endpoint is used, accepts a redirect_uri containing userinfo in the authority component, which is not consistent with RFC 6819 section 5.2.3.5. An authorization code may be sent to an attacker-controlled destination. This might have further implications in conjunction with "Decompiling the app revealed a hardcoded secret."
Metrics
Affected Vendors & Products
References
History
Mon, 21 Apr 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 21 Apr 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Sonos api.sonos.com through 2025-04-21, when the /login/v3/oauth endpoint is used, accepts a redirect_uri containing userinfo in the authority component, which is not consistent with RFC 6819 section 5.2.3.5. An authorization code may be sent to an attacker-controlled destination. This might have further implications in conjunction with "Decompiling the app revealed a hardcoded secret." | |
Weaknesses | CWE-647 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-04-21T00:00:00.000Z
Updated: 2025-04-21T14:03:20.440Z
Reserved: 2025-04-19T00:00:00.000Z
Link: CVE-2025-43916

Updated: 2025-04-21T14:02:51.062Z

Status : Awaiting Analysis
Published: 2025-04-21T14:15:36.593
Modified: 2025-04-21T14:23:45.950
Link: CVE-2025-43916

No data.