First published: Tue Apr 19 2022(Updated: )
next-auth v3 users before version 3.29.2 are impacted. next-auth version 4 users before version 4.3.2 are also impacted. Upgrading to 3.29.2 or 4.3.2 will patch this vulnerability. If you are not able to upgrade for any reason, you can add a configuration to your callbacks option. If you already have a `redirect` callback, make sure that you match the incoming `url` origin against the `baseUrl`.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextauth.js Next-auth | >=3.0.0<3.29.2 | |
Nextauth.js Next-auth | >=4.0.0<4.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-24858.
next-auth v3 users before version 3.29.2 and next-auth version 4 users before version 4.3.2 are impacted by this vulnerability.
You can fix this vulnerability by upgrading to version 3.29.2 if you are using next-auth v3, or upgrading to version 4.3.2 if you are using next-auth version 4.
If you are not able to upgrade, you can add a configuration to your callbacks option or follow the suggested alternatives in the official documentation.
You can find more information about this vulnerability on the official GitHub Security Advisory and the Next-auth documentation.