Vulnerability Description
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. Versions before and including `1.4.1` are vulnerable to reflected XSS. An attacker can execute arbitrary code by providing an XSS payload in the `error` query parameter which is then processed by the callback handler as an error message. You are affected by this vulnerability if you are using `@auth0/nextjs-auth0` version `1.4.1` or lower **unless** you are using custom error handling that does not return the error message in an HTML response. Upgrade to version `1.4.1` to resolve. The fix adds basic HTML escaping to the error message and it should not impact your users.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Auth0 | Nextjs-Auth0 | < 1.4.2 |
Related Weaknesses (CWE)
References
- https://github.com/auth0/nextjs-auth0/commit/6996e2528ceed98627caa28abafbc09e901PatchThird Party Advisory
- https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-954c-jjx6-cxv7Third Party Advisory
- https://www.npmjs.com/package/%40auth0/nextjs-auth0
- https://github.com/auth0/nextjs-auth0/commit/6996e2528ceed98627caa28abafbc09e901PatchThird Party Advisory
- https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-954c-jjx6-cxv7Third Party Advisory
- https://www.npmjs.com/package/%40auth0/nextjs-auth0
FAQ
What is CVE-2021-32702?
CVE-2021-32702 is a vulnerability with a CVSS score of 8.0 (HIGH). The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. Versions before and including `1.4.1` are vulnerable to reflected XSS. An attacker can execute arbitrar...
How severe is CVE-2021-32702?
CVE-2021-32702 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-32702?
Check the references section above for vendor advisories and patch information. Affected products include: Auth0 Nextjs-Auth0.