Overview

A critical vulnerability in Google's OAuth authentication flow enables attackers to exploit domain ownership changes for unauthorized access. The flaw affects millions of users through Sign in with Google

Whom it may concern

  • IT Security Teams managing OAuth implementations
  • SaaS Platform Administrators
  • Startup companies using Google authentication
  • HR departments with sensitive data exposure risk

Key Findings

  1. Attackers can acquire expired domains to access multiple SaaS applications
  1. Google has acknowledged the issue with a $1,337 bounty
  1. Sensitive HR data exposed including SSNs and tax documents
  1. Sub field provides potential mitigation but implementation varies

Risk Analysis

  • Probability: High due to ease of domain acquisition
  • Impact: Critical - affects multiple systems and sensitive data
  • Attack Vector: OAuth token manipulation
  • Exposure: Millions of users potentially affected

Action Items

  • Implement sub field as unique identifier
  • Proper domain decommissioning procedures
  • Regular audit of third-party application access
  • Update authentication implementations per Google's guidance

Sources

  • [The Hacker News](https://thehackernews.com/2025/01/google-oauth-vulnerability-exposes.html)
Share this article

Stay up to date

Join my community and receive the latest risk news and trends.