CVE-2019-12419
Description
Apache CXF before 3.3.4 and 3.2.11 provides all of the components that are required to build a fully fledged OpenId Connect service. There is a vulnerability in the access token services, where it does not validate that the authenticated principal is equal to that of the supplied clientId parameter in the request. If a malicious client was able to somehow steal an authorization code issued to another client, then they could exploit this vulnerability to obtain an access token for the other client.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache CXF OpenId Connect access token service fails to validate the authenticated principal matches the clientId parameter, allowing token theft.
Vulnerability
Analysis
CVE-2019-12419 is an improper authentication validation vulnerability in Apache CXF versions before 3.3.4 and 3.2.11. The flaw exists in the access token service components used for building OpenId Connect services. When processing token requests, the service does not verify that the authenticated principal matches the supplied clientId parameter.
Exploitation
To exploit this vulnerability, a malicious client must first obtain an authorization code that was issued to a different, legitimate client. This could potentially be achieved through cross-site scripting, open redirects, or other means of authorization code interception. Once the attacker possesses the stolen authorization code, they can present it along with their own client credentials, but using the victim's clientId. Because the service fails to enforce the binding between the authenticated principal and the clientId, the attacker can successfully redeem the authorization code for an access token intended for another client.
Impact
Successful exploitation allows an attacker to obtain a valid access token that belongs to a different client. Depending on the scope and permissions associated with that token, the attacker may then be able to access protected resources or impersonate the legitimate client. This essentially undermines the security of the OAuth2/OIDC flow, as the authorization code grant's fundamental assumption (that the party redeeming the code is the same one that initiated the request) is broken.
Mitigation
Apache has released patches in versions 3.3.4 and 3.2.11 which fix this validation issue [1]. Users of affected versions are strongly advised to upgrade immediately. There are no known workarounds for this vulnerability within the Apache CXF codebase; the fix requires updating the library.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.cxf:cxfMaven | < 3.2.11 | 3.2.11 |
org.apache.cxf:cxfMaven | >= 3.3.0, < 3.3.4 | 3.3.4 |
Affected products
2- Apache/Apache CXFv5Range: versions before 3.3.4 and 3.2.11
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
25- github.com/advisories/GHSA-cw6w-q88j-6mqfghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-12419ghsaADVISORY
- cxf.apache.org/security-advisories.data/CVE-2019-12419.txt.ascghsax_refsource_CONFIRMWEB
- lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r861eb1a9e0250e9150215b17f0263edf62becd5e20fc96251cff59f6%40%3Cdev.cxf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r861eb1a9e0250e9150215b17f0263edf62becd5e20fc96251cff59f6@%3Cdev.cxf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/re7593a274ee0a85d304d5d42c66fc0081c94d7f22bc96a1084d43b80%40%3Cdev.cxf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/re7593a274ee0a85d304d5d42c66fc0081c94d7f22bc96a1084d43b80@%3Cdev.cxf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/ree5fc719e330f82ae38a2b0050c91f18ed5b878312dc0b9e0b9815be%40%3Cdev.cxf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/ree5fc719e330f82ae38a2b0050c91f18ed5b878312dc0b9e0b9815be@%3Cdev.cxf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3EghsaWEB
- www.oracle.com/security-alerts/cpuApr2021.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpuapr2020.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpujan2020.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpuoct2020.htmlghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.