Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mr6f-h57v-rpj5

Опубликовано: 10 дек. 2025
Источник: github
Github: Прошло ревью
CVSS3: 3.7

Описание

Improper Validation of Query Parameters in Auth0 Next.js SDK

Description

An input-validation flaw in the returnTo parameter in the Auth0 Next.js SDK could allow attackers to inject unintended OAuth query parameters into the Auth0 authorization request. Successful exploitation may result in tokens being issued with unintended parameters

Am I Affected?

You are affected if you meet the following preconditions:

  • Applications using the auth0/nextjs-auth0 SDK version prior to 4.13.0

Affected product and versions

Auth0/nextjs-auth0 versions >= 4.9.0 and < 4.13.0

Resolution

Upgrade Auth0/nextjs-auth0 version to v4.13.0

Acknowledgements

Okta would like to thank Joshua Rogers (MegaManSec) for their discovery and responsible disclosure.

Пакеты

Наименование

@auth0/nextjs-auth0

npm
Затронутые версииВерсия исправления

>= 4.9.0, < 4.13.0

4.13.0

EPSS

Процентиль: 17%
0.00054
Низкий

3.7 Low

CVSS3

Дефекты

CWE-184

Связанные уязвимости

CVSS3: 5.7
nvd
около 2 месяцев назад

The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. Versions 4.9.0 through 4.12.1 contain an input-validation flaw in the returnTo parameter, which could allow attackers to inject unintended OAuth query parameters into the Auth0 authorization request. Successful exploitation may result in tokens being issued with unintended parameters. This issue is fixed in version 4.13.0.

EPSS

Процентиль: 17%
0.00054
Низкий

3.7 Low

CVSS3

Дефекты

CWE-184