An attacker can learn state from the authorization request if the authorization endpoint at the authorization server contains links or third-party content.
OAuth 2.0 Security Best Current Practice (draft 25) (SecBCP, section 4.2.2)
This threat is considered fully mitigated if all the test cases from one of the following test sets succeed.
Back to the threat overview