Auth BypassCVSS 9.0critical
8 min read
The Login Link That Let Anyone In
The platform sent login links by email. Each link contained a token. The problem was the application accepted that token from the URL and bound it to whoever authenticated next — which meant an attacker who knew the token could wait for any user to log in and immediately inherit their session.
Read case