CVE-2022-31093

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-31093
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-31093.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-31093
Aliases
Published
2022-06-27T21:30:20Z
Modified
2025-10-21T19:33:25Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Improper Handling of `callbackUrl` parameter in next-auth
Details

NextAuth.js is a complete open source authentication solution for Next.js applications. In affected versions an attacker can send a request to an app using NextAuth.js with an invalid callbackUrl query parameter, which internally is converted to a URL object. The URL instantiation would fail due to a malformed URL being passed into the constructor, causing it to throw an unhandled error which led to the API route handler timing out and logging in to fail. This has been remedied in versions 3.29.5 and 4.5.0. If for some reason you cannot upgrade, the workaround requires you to rely on Advanced Initialization. Please see the documentation for more.

Database specific
{
    "cwe_ids": [
        "CWE-754"
    ]
}
References

Affected packages

Git / github.com/nextauthjs/next-auth

Affected ranges

Type
GIT
Repo
https://github.com/nextauthjs/next-auth
Events