First published: Thu May 01 2025(Updated: )
### Summary PKCE was implemented in the OAuth implementation in workers-oauth-provider that is part of[ MCP framework](https://github.com/cloudflare/workers-mcp). However, it was found that an attacker could cause the check to be skipped. ### Impact PKCE is a defense-in-depth mechanism against certain kinds of attacks and was an optional extension in OAuth 2.0 which became required in the OAuth 2.1 draft. (Note that the MCP specification requires OAuth 2.1.) This bug completely bypasses PKCE protection. ### Patches Fixed in: https://github.com/cloudflare/workers-oauth-provider/pull/27 We patched up the vulnerabilities in the latest version, v 0.0.5 of the Workers OAuth provider (https://www.npmjs.com/package/@cloudflare/workers-oauth-provider). You'll need to update your MCP servers to use that version to resolve the vulnerability. ### Workarounds None
Affected Software | Affected Version | How to fix |
---|---|---|
npm/@cloudflare/workers-oauth-provider | <0.0.5 | 0.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of GHSA-qgp8-v765-qxx9 is considered critical due to the potential bypass of authentication mechanisms.
To fix GHSA-qgp8-v765-qxx9, update the @cloudflare/workers-oauth-provider to version 0.0.5 or later.
GHSA-qgp8-v765-qxx9 affects versions of @cloudflare/workers-oauth-provider prior to 0.0.5.
PKCE stands for Proof Key for Code Exchange and is a security measure within OAuth to enhance authorization flow.
An attacker could exploit GHSA-qgp8-v765-qxx9 to skip critical authentication checks, leading to unauthorized access.