CVE-2025-43916 – Sonos API Open Redirection and Hardcoded Secret Vulnerability

The following table lists the changes that have been made to the
CVE-2025-43916 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Apr. 21, 2025

    Action Type Old Value New Value
    Added Tag exclusively-hosted-service
    Added Description Sonos api.sonos.com through 2025-04-21, when the /login/v3/oauth endpoint is used, accepts a redirect_uri containing userinfo in the authority component, which is not consistent with RFC 6819 section 5.2.3.5. An authorization code may be sent to an attacker-controlled destination. This might have further implications in conjunction with “Decompiling the app revealed a hardcoded secret.”
    Added CVSS V3.1 AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N
    Added CWE CWE-647
    Added Reference https://github.com/larlarua/vulnerability-reports/blob/main/CVE-2025-43916/detail.md
Share the Post:

Related Posts