Improper Protection for Out of Bounds Signal Level Alerts Affecting @nocobase/auth package, versions <1.9.0-beta.18>=1.9.0 <1.9.22>=2.0.0-alpha.2 <2.0.0-alpha.52


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.05% (16th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-NOCOBASEAUTH-14287473
  • published10 Dec 2025
  • disclosed9 Dec 2025
  • creditH2u8s

Introduced: 9 Dec 2025

NewCVE-2025-13877  (opens in a new tab)
CWE-1320  (opens in a new tab)

How to fix?

Upgrade @nocobase/auth to version 1.9.0-beta.18, 1.9.22, 2.0.0-alpha.52 or higher.

Overview

@nocobase/auth is a

Affected versions of this package are vulnerable to Improper Protection for Out of Bounds Signal Level Alerts via the official one-click Docker deployment configuration, a public default JWT key was historically provided.. An attacker can gain unauthorized access to administrative functions and sensitive data by forging valid authentication tokens using a known default secret.

Note: This is only exploitable if the deployment uses the default Docker configuration without explicitly overriding the JWT secret.

Workaround

This vulnerability can be mitigated by explicitly setting a strong, randomly generated JWT secret via environment variables, restarting all running instances, invalidating all existing JWT sessions, and ensuring no default secret values are present in configuration files or secrets.

CVSS Base Scores

version 4.0
version 3.1