DanielAtStruggly
01/04/2023, 4:23 PMrp_st
01/04/2023, 5:20 PMrp_st
01/04/2023, 5:21 PMrp_st
01/04/2023, 5:21 PMDanielAtStruggly
01/05/2023, 12:01 PMIf you are calling the above API on page load, there is an edge case in which email clients might open the verification link in the email (for scanning purposes) and consume the token in the URL. This would lead to issues in which an attacker could sign up using someone else's email and end up with a verified status!
Could you please give some more hints/info about that? How is the attacker able to sign up using someone else's email?
All the data which should be relevant to verify an email should be located into the token, right?rp_st
01/05/2023, 12:20 PMDanielAtStruggly
01/05/2023, 12:37 PM