An attacker may try to guess valid authorization 'code' values and send the guessed code value using the grant type 'code' in order to obtain a valid access token.
OAuth 2.0 Threat Model and Security Considerations (RFC6819, section 4.4.1.3)
This threat is considered fully mitigated if all the test cases from the following test set succeed.
Back to the threat overview