Skip to content

Conversation

@arthurchui
Copy link

The request phase of the OmniAuth Ruby gem (1.9.2 and earlier) is vulnerable to Cross-Site Request Forgery when used as part of the Ruby on Rails framework, allowing accounts to be connected without user intent, user interaction, or feedback to the user. This permits a secondary account to be able to sign into the web application as the primary account.

It is recommended to upgrade omniauth to >=2.0.

References: GHSA-ww4x-rwq6-qpgf

@arthurchui
Copy link
Author

I have signed the CLA!

@arthurchui arthurchui closed this Nov 27, 2025
@arthurchui arthurchui deleted the omniauth-github-2.0.1 branch November 27, 2025 19:58
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant