CVE-2025-15622
Received Received - Intake
Insufficiently Protected OAuth2 Credentials in Sparx Enterprise Architect

Publication date: 2026-04-17

Last updated on: 2026-04-17

Assigner: National Cyber Security Centre Finland

Description
Insufficiently Protected Credentials vulnerability in Sparx Systems Pty Ltd. Sparx Enterprise Architect. Client reveals plaintext OAuth2 client secretDesktop client decodes the secret and uses the plaintext secret to exchange it into an access and id tokens as part of the OpenID authentication flow.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-17
Last Modified
2026-04-17
Generated
2026-05-07
AI Q&A
2026-04-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sparx_systems enterprise_architect *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-522 The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves insufficient protection of credentials in Sparx Systems Pty Ltd's Sparx Enterprise Architect. Specifically, the client reveals the plaintext OAuth2 client secret. The desktop client decodes this secret and uses it in its plaintext form to exchange for access and ID tokens during the OpenID authentication flow.


How can this vulnerability impact me? :

Because the OAuth2 client secret is exposed in plaintext, an attacker who gains access to this secret could potentially impersonate the client and obtain access and ID tokens. This could lead to unauthorized access to protected resources or user data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart