GHSA-mr6f-h57v-rpj5

Suggest an improvement
Source
https://github.com/advisories/GHSA-mr6f-h57v-rpj5
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/12/GHSA-mr6f-h57v-rpj5/GHSA-mr6f-h57v-rpj5.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-mr6f-h57v-rpj5
Aliases
Published
2025-12-10T21:35:58Z
Modified
2025-12-11T16:21:52.892228Z
Severity
  • 3.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N CVSS Calculator
Summary
Improper Validation of Query Parameters in Auth0 Next.js SDK
Details

Description

An input-validation flaw in the returnTo parameter in the Auth0 Next.js SDK could allow attackers to inject unintended OAuth query parameters into the Auth0 authorization request. Successful exploitation may result in tokens being issued with unintended parameters

Am I Affected?

You are affected if you meet the following preconditions: - Applications using the auth0/nextjs-auth0 SDK version prior to 4.13.0

Affected product and versions

Auth0/nextjs-auth0 versions >= 4.9.0 and < 4.13.0

Resolution

Upgrade Auth0/nextjs-auth0 version to v4.13.0

Acknowledgements

Okta would like to thank Joshua Rogers (MegaManSec) for their discovery and responsible disclosure.

Database specific
{
    "cwe_ids": [
        "CWE-184"
    ],
    "severity": "LOW",
    "github_reviewed_at": "2025-12-10T21:35:58Z",
    "nvd_published_at": "2025-12-11T01:16:00Z",
    "github_reviewed": true
}
References

Affected packages

npm / @auth0/nextjs-auth0

Package

Name
@auth0/nextjs-auth0
View open source insights on deps.dev
Purl
pkg:npm/%40auth0/nextjs-auth0

Affected ranges

Type
SEMVER
Events
Introduced
4.9.0
Fixed
4.13.0