A recently discovered security vulnerability, identified as CVE-2022-34155, affects the miniOrange OAuth Single Sign On – SSO (OAuth Client) WordPress plugin. Leveraging this vulnerability, an attacker can bypass standard authentication mechanisms and gain unauthorized access to the affected website or application.

This post will provide a detailed analysis of the vulnerability, including code snippets and relevant references. We'll discuss how the problem occurs and demonstrate an example of exploiting this vulnerability. It is essential to understand and mitigate such issues to protect your sensitive data and secure your online presence.


The miniOrange OAuth Single Sign On – SSO (OAuth Client) plugin for WordPress enables users to easily implement SSO (Single Sign On) with social, enterprise, and third-party OAuth providers. However, an improper authentication vulnerability allows an attacker to bypass the standard authentication mechanism in affected versions of the plugin.

The vulnerability is due to insufficient checks during the authentication process. An attacker can intercept and modify the authentication request, resulting in unauthorized access to the targeted account.

Exploit Details

To exploit this vulnerability, an attacker can employ a man-in-the-middle (MITM) attack during the victim's OAuth authentication process.

1. First, the attacker has to intercept the HTTP request sent by the victim's browser to the OAuth web service.
2. Next, the attacker modifies the request’s GET parameters to a specific value, which tricks the plugin's authentication process.
3. As a result, the victim's account becomes accessible to the attacker without needing the correct password.

Code Snippet

The following example demonstrates the code vulnerability in the 'mo_oauth_client_validate_access_token' function of the miniOrange OAuth Single Sign On – SSO (OAuth Client) plugin:

function mo_oauth_client_validate_access_token( $userInfo, $access_token )
  $email = isset( $user_info->email ) ? $user_info->email : '';
  if ( empty( $email ) ) {
    return false;

In this function, the plugin only checks if the 'email' field is empty or not, without validating whether the field has been tampered with by an attacker.


To mitigate this vulnerability, ensure that you're using at least version 6.23.4 of the plugin, which contains a patch addressing the issue. Update to the latest version as soon as possible by following these steps:

3. Locate 'miniOrange OAuth Single Sign On – SSO (OAuth Client),' and click 'Update Now' if available.

Additional security measures include employing secure connections (such as SSL/TLS) and monitoring network traffic to detect potential MITM attacks.

Original References

- CVE-2022-34155 details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34155
- Plugin's official webpage: https://wordpress.org/plugins/miniorange-login-openid/


CVE-2022-34155 is a critical vulnerability that allows an attacker to bypass the authentication process in the miniOrange OAuth Single Sign On – SSO (OAuth Client) plugin. It is imperative to update your plugin to the patched version to secure your website and protect your data. Stay alert to new vulnerabilities and apply patches in a timely manner to maintain a secure online presence for you and your users.


Published on: 07/18/2023 14:15:00 UTC
Last modified on: 07/27/2023 15:12:00 UTC