Insufficiently Protected Credentials Affecting expo package, versions >=45.0.0 <48.0.0


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.95% (76th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-EXPO-13559201
  • published16 Oct 2025
  • disclosed24 Apr 2023
  • creditAkshay hbabathe

Introduced: 24 Apr 2023

CVE-2023-28131  (opens in a new tab)
CWE-522  (opens in a new tab)

How to fix?

Upgrade expo to version 48.0.0 or higher.

Overview

expo is an umbrella package that contains the client-side code for accessing system functionality such as contacts, camera, and location in Expo apps.

Affected versions of this package are vulnerable to Insufficiently Protected Credentials via the Expo AuthSession Redirect Proxy process. An attacker can gain unauthorized access to user accounts and obtain sensitive credentials by tricking a victim into clicking a crafted malicious link. This is because auth.expo.io stores an app’s callback URL before the user explicitly confirms they trust it.

Note: The vulnerability has been mitigated by requiring users to confirm unverified callback URLs. In addition, developers are advised to migrate from useProxy and the auth.expo.io service (deprecated as of SDK 48) to using their own deep links with third-party authentication providers directly, which is more secure and reliable.

References

CVSS Base Scores

version 4.0
version 3.1