The authorization request is susceptible to clickjacking attacks, also called user interface redressing. An attacker can use this vector to obtain the user's authentication credentials, change the scope of access granted to the client, and potentially access the user's resources.
OAuth 2.0 Security Best Current Practice (draft 25) (SecBCP, section 4.16)
This threat is considered fully mitigated if all the test cases from the following test set succeed.
Back to the threat overview