{"id":"CVE-2020-26938","details":"In oauth2-server (aka node-oauth2-server) through 3.1.1, the value of the redirect_uri parameter received during the authorization and token request is checked against an incorrect URI pattern (\"[a-zA-Z][a-zA-Z0-9+.-]+:\") before making a redirection. This allows a malicious client to pass an XSS payload through the redirect_uri parameter while making an authorization request. NOTE: this vulnerability is similar to CVE-2020-7741.","aliases":["GHSA-4rg6-fm25-gc34"],"modified":"2026-03-14T10:24:31.571127Z","published":"2022-08-29T21:15:08.863Z","references":[{"type":"ADVISORY","url":"https://tools.ietf.org/html/rfc3986#section-3"},{"type":"ADVISORY","url":"https://tools.ietf.org/html/rfc6749#section-3.1.2"},{"type":"REPORT","url":"https://github.com/oauthjs/node-oauth2-server/issues/637"},{"type":"EVIDENCE","url":"https://github.com/oauthjs/node-oauth2-server/blob/91d2cbe70a0eddc53d72def96864e2de0fd41703/lib/grant-types/authorization-code-grant-type.js#L143"},{"type":"EVIDENCE","url":"https://github.com/oauthjs/node-oauth2-server/blob/91d2cbe70a0eddc53d72def96864e2de0fd41703/lib/validator/is.js#L12"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/oauthjs/node-oauth2-server","events":[{"introduced":"0"},{"last_affected":"0bbdcfeaaf0d73e06acc028cd0d009eafab70817"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.1.1"}]}}],"versions":["v1.0.0","v1.1.0","v1.1.1","v1.2.0","v1.2.1","v1.2.2","v1.2.3","v1.2.4","v1.2.5","v1.3.0","v1.3.1","v1.3.2","v1.4.0","v1.4.1","v1.5.0","v1.5.1","v1.5.2","v2.2.0","v2.2.1","v2.2.2","v2.3.0","v2.4.0","v2.4.1","v3.0.0","v3.0.0-b3","v3.0.0-b3.1","v3.0.0-b4","v3.0.2","v3.1.0","v3.1.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-26938.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N"}]}