Under certain pre-conditions the vulnerability allows an attacker to spoof parts of the device flow and use a device_code to retrieve an access token for other OAuth clients.
{
"nvd_published_at": "2023-12-21T10:15:34Z",
"severity": "LOW",
"github_reviewed_at": "2023-06-30T20:29:25Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-358"
]
}