Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File

Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File

Posted on May 28, 2025May 28, 2025 By CWS

Might 28, 2025Ravie LakshmananData Privateness / Vulnerability
Cybersecurity researchers have found a safety flaw in Microsoft’s OneDrive File Picker that, if efficiently exploited, may enable web sites to entry a person’s total cloud storage content material, versus simply the recordsdata chosen for add by way of the device.
“This stems from overly broad OAuth scopes and deceptive consent screens that fail to obviously clarify the extent of entry being granted,” the Oasis Analysis Group stated in a report shared with The Hacker Information. “This flaw may have extreme penalties, together with buyer information leakage and violation of compliance rules.”

It is assessed that a number of apps are affected, similar to ChatGPT, Slack, Trello, and ClickUp, given their integration with Microsoft’s cloud service.
The issue, Oasis stated, is the results of extreme permissions requested by the OneDrive File Picker, which seeks learn entry to the whole drive, even in circumstances solely a single file is uploaded as a result of absence of fine-grained OAuth scopes for OneDrive.
Compounding issues additional, the consent immediate customers are offered with previous to a file add is imprecise and doesn’t adequately convey the extent of entry being granted, thereby exposing customers to sudden safety dangers.

“The dearth of fine-grained scopes makes it unimaginable for customers to differentiate between malicious apps that focus on all recordsdata and legit apps that ask for extreme permissions just because there isn’t any different safe possibility,” Oasis famous.

The New York-based safety firm additional identified that the OAuth tokens used to authorize entry are sometimes saved insecurely, including they’re saved within the browser’s session storage in plaintext format.
One other potential pitfall is that the authorization workflows may additionally contain issuing a refresh token, granting the appliance ongoing entry to person information by permitting it to get new entry tokens with out having to ask the person to log in once more when the present token expires.

Following accountable disclosure, Microsoft has acknowledged the issue, though there isn’t any repair as but. Within the interim, it is value contemplating quickly eradicating the choice to add recordsdata utilizing OneDrive by means of OAuth till a safe various is in place. Alternately, it is suggested to keep away from utilizing refresh tokens and retailer entry tokens in a safe method and eliminate them when not wanted.
The Hacker Information has reached out to Microsoft for additional remark, and we’ll replace the story if we hear again.
“The dearth of fine-grained OAuth scopes mixed with Microsoft’s imprecise person immediate is a harmful mixture that places each private and enterprise customers in danger,” Oasis stated. “This discovery reinforces the significance of steady vigilance in OAuth scope administration, common safety assessments, and proactive monitoring to guard person information.”

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Access, Apps, Cloud, File, Flaw, Full, Grants, Microsoft, OneDrive, Picker, Uploading

Post navigation

Previous Post: Hackers Exploit SimpleHelp RMM Tool to Deploy DragonForce Ransomware
Next Post: WordPress TI WooCommerce Wishlist Plugin Vulnerability Exposes 100,000+ Websites To Cyberattack

Related Posts

OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps The Hacker News
CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV The Hacker News
DoJ Seizes Tether in Major Crypto Scam Crackdown DoJ Seizes Tether in Major Crypto Scam Crackdown The Hacker News
Experts Confirm JS#SMUGGLER Uses Compromised Sites to Deploy NetSupport RAT Experts Confirm JS#SMUGGLER Uses Compromised Sites to Deploy NetSupport RAT The Hacker News
CISA Adds 3 D-Link Vulnerabilities to KEV Catalog Amid Active Exploitation Evidence CISA Adds 3 D-Link Vulnerabilities to KEV Catalog Amid Active Exploitation Evidence The Hacker News
Why Data Security and Privacy Need to Start in Code Why Data Security and Privacy Need to Start in Code The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark