HomeCloudflareCVE-2025-4144

CVE-2025-4144

MEDIUM
5.3CVSS
Published: 2025-05-01
Updated: 2025-05-12
AI Analysis

Description

PKCE was implemented in the OAuth implementation in workers-oauth-provider that is part of MCP framework https://github.com/cloudflare/workers-mcp . However, it was found that an attacker could cause the check to be skipped. Fixed in: https://github.com/cloudflare/workers-oauth-provider/pull/27 https://github.com/cloudflare/workers-oauth-provider/pull/27 Impact: PKCE is a defense-in-depth mechanism against certain kinds of attacks and was an optional extension in OAuth 2.0 which became required in the OAuth 2.1 draft. (Note that the MCP specification requires OAuth 2.1.). This bug completely bypasses PKCE protection.

CVSS Metrics

Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Amber
Attack Vector
network
Complexity
low
Privileges
none
User Action
passive
Confidentiality
undefined
Integrity
undefined
Availability
undefined
Weaknesses
CWE-287NVD-CWE-noinfo

Metadata

Primary Vendor
CLOUDFLARE
Published
5/1/2025
Last Modified
5/12/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

cloudflare : workers-oauth-provider

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-4144 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com