Vulnerability Description
Clerk JavaScript is the official JavaScript repository for Clerk authentication. has(), auth.protect(), and related authorization predicates in @clerk/shared, @clerk/nextjs, @clerk/backend, and other framework SDKs can return true for certain combined authorization checks when the result should be false, allowing a gated action to proceed for a user who does not satisfy the full set of requested conditions. This call shape can be bypassed if certain conditions are met: a has() or auth.protect() call that combines a reverification check with any of role, permission, feature, or plan, or that combines a billing check (feature or plan) with a role or permission check. This vulnerability is fixed in @clerk/clerk-js 5.125.10 and 6.7.5.
Related Weaknesses (CWE)
References
- https://github.com/clerk/javascript/security/advisories/GHSA-w24r-5266-9c3c
- https://github.com/clerk/javascript/security/advisories/GHSA-w24r-5266-9c3c
FAQ
What is CVE-2026-42349?
CVE-2026-42349 is a documented vulnerability. Clerk JavaScript is the official JavaScript repository for Clerk authentication. has(), auth.protect(), and related authorization predicates in @clerk/shared, @clerk/nextjs, @clerk/backend, and other ...
How severe is CVE-2026-42349?
CVSS scoring is not yet available for CVE-2026-42349. Check NVD for updates.
Is there a patch for CVE-2026-42349?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.