LinkedIn SSO Flaw Bypasses Password Reset Protections

Finding a Security Flaw in LinkedIn’s Google Single Sign-On Integration

While reviewing LinkedIn’s account security features, I discovered a serious problem with how their Google Single Sign-On (SSO) works—one that could let someone bypass password resets and logouts.


Description of the Issue

Normally, when you change your LinkedIn password and select the “log out from all devices” option, you expect all your active sessions to be closed. This helps protect your account if you think someone else has access.

However, I found that if someone remains logged into the Gmail account linked to your LinkedIn, they can simply click “Sign in with Google” on LinkedIn and immediately regain access—without needing your old password or any additional verification.

This means LinkedIn trusts the active Google login session more than your explicit request to log out everywhere, which breaks the security model users rely on.


Steps to Reproduce

  1. Log into LinkedIn using Google SSO tied to your Gmail account.

  2. Change your LinkedIn password.

  3. Select “Log out from all devices” in your LinkedIn security settings.

  4. On the same device (or another with active Gmail login), go to LinkedIn and click “Sign in with Google.”

  5. Notice you regain full access without entering the LinkedIn password or verifying identity again.


Security and Privacy Impact

This behavior introduces several risks:

  • Bypassing Password Resets: Attackers or unauthorized users with Gmail access can skip LinkedIn’s logout protections.

  • Session Management Flaw: LinkedIn’s session invalidation doesn’t fully consider active SSO sessions.

  • Potential Account Takeover: Anyone with Gmail access can get back into LinkedIn, even after a forced logout.

  • Misalignment with User Intent: The user’s decision to log out everywhere is overridden by LinkedIn trusting Google sessions blindly.


Business Impact

If exploited, this flaw could:

  • Result in account hijackings and data theft.

  • Damage LinkedIn’s reputation for security and trustworthiness.

  • Cause users to lose confidence in password reset and logout features.


Conclusion

This experience taught me how important it is that Single Sign-On systems respect explicit security actions like password changes and logout requests. Users expect that when they take steps to secure their accounts, all access is truly cut off.

While this issue was reported and later marked a duplicate, I believe it highlights a crucial area for tighter security. SSO should never override a user’s intent to fully log out.


Comments

Popular posts from this blog

When an AI Search Engine Forgot Who It Was: A Bug Report That Changed Perplexity AI’s Identity

Understanding Android’s One-Time Permissions and Their Privacy Implications

I Accidentally Gained Admin Access to a LinkedIn Company Page - No Verification Needed