Improper Access Control Affecting @clerk/nextjs package, versions >=4.7.0 <4.29.3


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (31st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Access Control vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-CLERKNEXTJS-6156632
  • published14 Jan 2024
  • disclosed12 Jan 2024
  • creditnikosdouvlis, colinclerk, agis, braden-clerk

Introduced: 12 Jan 2024

CVE-2024-22206  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade @clerk/nextjs to version 4.29.3 or higher.

Overview

@clerk/nextjs is a Clerk SDK for NextJS

Affected versions of this package are vulnerable to Improper Access Control due to a logic flaw in the auth method in the App Router or getAuth method in the Pages Router. An attacker can gain unauthorized access or escalate privileges by exploiting the insecure direct object reference (IDOR) vulnerability.

Note

Only the @clerk/nextjs SDK is impacted. Other SDKs, including other Javascript-based SDKs, are not affected.

CVSS Scores

version 3.1