First published: Fri May 20 2022(Updated: )
NextAuth.js (next-auth) is am open source authentication solution for Next.js applications. Prior to versions 3.29.3 and 4.3.3, an open redirect vulnerability is present when the developer is implementing an OAuth 1 provider. Versions 3.29.3 and 4.3.3 contain a patch for this issue. The maintainers recommend adding a certain configuration to one's `callbacks` option as a workaround for those unable to upgrade.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextauth.js Next-auth | <3.29.3 | |
Nextauth.js Next-auth | >=4.0.0<4.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29214 is an open redirect vulnerability in NextAuth.js (next-auth) prior to versions 3.29.3 and 4.3.3 when implementing an OAuth 1 provider.
CVE-2022-29214 has a severity score of 6.1 (medium severity).
Versions prior to 3.29.3 and 4.3.3 of NextAuth.js (next-auth) are affected by CVE-2022-29214.
To fix CVE-2022-29214, you should update NextAuth.js to version 3.29.3 or 4.3.3, which contain a patch for this vulnerability.
You can find more information about CVE-2022-29214 at the following references: [Reference 1](https://github.com/nextauthjs/next-auth/releases/tag/next-auth%40v4.3.3) [Reference 2](https://github.com/nextauthjs/next-auth/security/advisories/GHSA-q2mx-j4x2-2h74)