Authorization Bypass Through User-Controlled Key Affecting @better-auth/passkey package, versions <1.4.0-beta.22


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Authorization Bypass Through User-Controlled Key vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-BETTERAUTHPASSKEY-14122020
  • published27 Nov 2025
  • disclosed25 Nov 2025
  • creditGoksan

Introduced: 25 Nov 2025

New CVE NOT AVAILABLE CWE-284  (opens in a new tab)
CWE-639  (opens in a new tab)

How to fix?

Upgrade @better-auth/passkey to version 1.4.0-beta.22 or higher.

Overview

@better-auth/passkey is a Passkey plugin for Better Auth

Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key via a POST /passkey/delete-passkey request. An attacker can delete arbitrary passkeys belonging to other users by providing their IDs through insecure direct object reference.

References

CVSS Base Scores

version 4.0
version 3.1