Open Redirect Affecting @workos/authkit-session package, versions <0.5.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (9th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Open Redirect vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-WORKOSAUTHKITSESSION-16425670
  • published6 May 2026
  • disclosed5 May 2026
  • creditkenkunz

Introduced: 5 May 2026

NewCVE-2026-42565  (opens in a new tab)
CWE-601  (opens in a new tab)

How to fix?

Upgrade @workos/authkit-session to version 0.5.1 or higher.

Overview

@workos/authkit-session is a Framework-agnostic authentication library for WorkOS with pluggable storage adapters

Affected versions of this package are vulnerable to Open Redirect via the handleCallback function when processing the returnPathname value derived from the OAuth state parameter. An attacker can redirect users to an external, attacker-controlled site by crafting a malicious authentication flow and influencing the state parameter. This is only exploitable if the application uses returnPathname as a redirect target without downstream validation or allowlisting.

CVSS Base Scores

version 4.0
version 3.1