Skip to content

@clerk/nextjs auth() and getAuth() methods vulnerable to insecure direct object reference (IDOR)

Critical
zythosec published GHSA-q6w5-jg5q-47vg Jan 12, 2024

Package

npm @clerk/nextjs (npm)

Affected versions

>= 4.7.0, < 4.29.3

Patched versions

4.29.3

Description

Impact

Unauthorized access or privilege escalation due to a logic flaw in auth() in the App Router or getAuth() in the Pages Router.

Affected Versions

All applications that that use @clerk/nextjs versions in the range of >= 4.7.0,< 4.29.3 in a Next.js backend to authenticate API Routes, App Router, or Route handlers. Specifically, those that call auth() in the App Router or getAuth() in the Pages Router. Only the @clerk/nextjs SDK is impacted. Other SDKs, including other Javascript-based SDKs, are not impacted.

Patches

Fix included in @clerk/nextjs@4.29.3.

References

Severity

Critical

CVE ID

CVE-2024-22206

Credits