CVE-2025-15622
Insufficiently Protected OAuth2 Credentials in Sparx Enterprise Architect
Publication date: 2026-04-17
Last updated on: 2026-04-17
Assigner: National Cyber Security Centre Finland
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sparx_systems | enterprise_architect | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-522 | The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves insufficient protection of credentials in Sparx Systems Pty Ltd's Sparx Enterprise Architect. Specifically, the client reveals the plaintext OAuth2 client secret. The desktop client decodes this secret and uses it in its plaintext form to exchange for access and ID tokens during the OpenID authentication flow.
How can this vulnerability impact me? :
Because the OAuth2 client secret is exposed in plaintext, an attacker who gains access to this secret could potentially impersonate the client and obtain access and ID tokens. This could lead to unauthorized access to protected resources or user data.