Improper Verification of Cryptographic Signature Affecting @clerk/backend package, versions <2.4.0


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-CLERKBACKEND-10674026
  • published10 Jul 2025
  • disclosed9 Jul 2025
  • creditGautierT

Introduced: 9 Jul 2025

NewCVE-2025-53548  (opens in a new tab)
CWE-347  (opens in a new tab)

How to fix?

Upgrade @clerk/backend to version 2.4.0 or higher.

Overview

@clerk/backend is a Clerk Backend SDK - REST Client for Backend API & JWT verification utilities

Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature via the verifyWebhook() function. An attacker can cause unauthorized actions to be accepted by submitting improperly signed webhook events.

Workaround

This vulnerability can be mitigated by manually verifying webhooks as described in the official documentation.

References

CVSS Base Scores

version 4.0
version 3.1