2026-03-26 20:4CVE-2026-3532drupal
PUBLISHED5.2CWE-178

OpenID Connect / OAuth client - Less critical - Access bypass - SA-CONTRIB-2026-027

Improper Handling of Case Sensitivity vulnerability in Drupal OpenID Connect / OAuth client allows Privilege Escalation.This issue affects OpenID Connect / OAuth client: from 0.0.0 before 1.5.0.

Problem type

Affected products

Drupal

OpenID Connect / OAuth client

< 1.5.0 - AFFECTED

References

GitHub Security Advisories

GHSA-g8fg-x943-8cvw

Improper Handling of Case Sensitivity vulnerability in Drupal OpenID Connect / OAuth client...

https://github.com/advisories/GHSA-g8fg-x943-8cvw

Improper Handling of Case Sensitivity vulnerability in Drupal OpenID Connect / OAuth client allows Privilege Escalation.This issue affects OpenID Connect / OAuth client: from 0.0.0 before 1.5.0.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-3532
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-3532",
    "assignerOrgId": "2c85b837-eb8b-40ed-9d74-228c62987387",
    "assignerShortName": "drupal",
    "dateUpdated": "2026-03-26T20:04:03.160Z",
    "dateReserved": "2026-03-04T16:42:01.310Z",
    "datePublished": "2026-03-26T20:04:03.160Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "2c85b837-eb8b-40ed-9d74-228c62987387",
        "shortName": "drupal",
        "dateUpdated": "2026-03-26T20:04:03.160Z"
      },
      "datePublic": "2026-03-04T18:02:00.000Z",
      "title": "OpenID Connect / OAuth client - Less critical - Access bypass - SA-CONTRIB-2026-027",
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper Handling of Case Sensitivity vulnerability in Drupal OpenID Connect / OAuth client allows Privilege Escalation.This issue affects OpenID Connect / OAuth client: from 0.0.0 before 1.5.0.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "Improper Handling of Case Sensitivity vulnerability in Drupal OpenID Connect / OAuth client allows Privilege Escalation.<p>This issue affects OpenID Connect / OAuth client: from 0.0.0 before 1.5.0.</p>"
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "Drupal",
          "product": "OpenID Connect / OAuth client",
          "collectionURL": "https://www.drupal.org/project/openid_connect",
          "repo": "https://git.drupalcode.org/project/openid_connect",
          "defaultStatus": "unaffected",
          "versions": [
            {
              "version": "0.0.0",
              "status": "affected",
              "versionType": "semver",
              "lessThan": "1.5.0"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-178 Improper Handling of Case Sensitivity",
              "cweId": "CWE-178",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://www.drupal.org/sa-contrib-2026-027"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Eric Smith (ericgsmith)",
          "type": "finder"
        },
        {
          "lang": "en",
          "value": "Philip Frilling (pfrilling)",
          "type": "remediation developer"
        },
        {
          "lang": "en",
          "value": "Greg Knaddison (greggles)",
          "type": "coordinator"
        },
        {
          "lang": "en",
          "value": "Drew Webber (mcdruid)",
          "type": "coordinator"
        },
        {
          "lang": "en",
          "value": "Juraj Nemec (poker10)",
          "type": "coordinator"
        }
      ]
    }
  }
}