Medium severity5.3NVD Advisory· Published Mar 20, 2026· Updated Apr 16, 2026
CVE-2026-31381
CVE-2026-31381
Description
An attacker can extract user email addresses (PII) exposed in base64 encoding via the state parameter in the OAuth callback URL.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
10- Thus Spoke…The GentlemenCheck Point Research · May 13, 2026
- Double Canvas breach acknowledged as ShinyHunters sets new pay-or-leak deadlineThe Register Security · May 11, 2026
- BWH Hotels guests warned after reservation data checks out with cybercrooksThe Register Security · May 11, 2026
- The questionnaire-based TPRM model is broken, and TrustCloud has a fixHelp Net Security · May 11, 2026
- Iran cybersnoops still LARPing as ransomware crooks in espionage opsThe Register Security · May 6, 2026
- Muddying the Tracks: The State-Sponsored Shadow Behind Chaos RansomwareRapid7 Blog · May 6, 2026
- ServiceNow clears agents for landing with new AI control towerThe Register Security · May 5, 2026
- TeamPCP Supply Chain Campaign: Update 008 - 26-Day Pause Ends with Three Concurrent Compromises (Checkmarx KICS, Bitwarden CLI Cascade, xinference PyPI), CanisterSprawl npm Worm Identified, and Tier 1 Coverage Returns, (Mon, Apr 27th)SANS Internet Storm Center · Apr 27, 2026
- Project Glasswing and the Next Challenge for Defenders: Turning Faster Discovery into Faster ActionRapid7 Blog · Apr 20, 2026
- The Increasing Role of AI in Vulnerability ResearchWordfence Blog · Apr 10, 2026