First published: Fri Jun 04 2021(Updated: )
auth0-lock is Auth0's signin solution. Versions of nauth0-lock before and including `11.30.0` are vulnerable to reflected XSS. An attacker can execute arbitrary code when the library's `flashMessage` feature is utilized and user input or data from URL parameters is incorporated into the `flashMessage` or the library's `languageDictionary` feature is utilized and user input or data from URL parameters is incorporated into the `languageDictionary`. The vulnerability is patched in version 11.30.1.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Auth0 Lock | <11.30.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-32641 is high with a CVSS score of 6.1.
To fix CVE-2021-32641, update the auth0-lock library to version 11.30.1 or newer.
CVE-2021-32641 is about a reflected XSS vulnerability in versions of auth0-lock before and including 11.30.0.