Browse all 14 CVE security advisories affecting ory. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Ory provides open-source identity and access management solutions, including authentication, authorization, and user management services. Historically, the project has faced vulnerabilities across multiple classes, including remote code execution, cross-site scripting, privilege escalation, and insecure direct object references. Notable security characteristics include its cloud-native architecture and OAuth 2.0/OpenID Connect implementations. While no major public security incidents have been widely reported, the project maintains a moderate CVE count with 14 recorded vulnerabilities to date, primarily related to input validation and access control issues in its core authentication flows.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2020-15233 | OAuth2 Redirect URL validity does not respect query parameters and character casing for loopback addresses — fositeCWE-20 | 6.1 | Medium | 2020-10-02 |
| CVE-2020-15234 | Redirect URL matching ignores character casing — fositeCWE-20 | 6.1 | Medium | 2020-10-02 |
| CVE-2020-15222 | Replay of private_key_jwt possible in ORY Fosite — fositeCWE-287 | 8.1 | High | 2020-09-24 |
| CVE-2020-15223 | Ignored storage errors on token revokation in ORY Fosite — fositeCWE-755 | 8.0 | High | 2020-09-24 |
This page lists every published CVE security advisory associated with ory. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.