296,676
Total vulnerabilities in the database
Upon authentication, the user could be associated by e-mail even if the associate_by_email
pipeline was not included. This could lead to account compromise when a third-party authentication service does not validate provided e-mail addresses or doesn't require unique e-mail addresses.
Review the authentication service policy on e-mail addresses; many will not allow exploiting this vulnerability.
Software | From | Fixed in |
---|---|---|
![]() |
- | 5.6.0 |