An attacker could attempt to replay valid requests in order to obtain or to modify/destroy user data.
OAuth 2.0 Threat Model and Security Considerations (RFC6819, section 4.6.2)
This threat is considered fully mitigated if all the test cases from the following test set succeed.
Back to the threat overview