Python Social Auth - Django has unsafe account association
Moderate severity
GitHub Reviewed
Published
Oct 9, 2025
in
python-social-auth/social-app-django
•
Updated Oct 13, 2025
Description
Published to the GitHub Advisory Database
Oct 9, 2025
Reviewed
Oct 9, 2025
Published by the National Vulnerability Database
Oct 9, 2025
Last updated
Oct 13, 2025
Impact
Upon authentication, the user could be associated by e-mail even if the
associate_by_email
pipeline was not included. This could lead to account compromise when a third-party authentication service does not validate provided e-mail addresses or doesn't require unique e-mail addresses.Patches
Workarounds
Review the authentication service policy on e-mail addresses; many will not allow exploiting this vulnerability.
References