CVE-2022-39263

NextAuth.js Upstash Adapter missing token verification

Description

`@next-auth/upstash-redis-adapter` is the Upstash Redis adapter for NextAuth.js, which provides authentication for Next.js. Applications that use `next-auth` Email Provider and `@next-auth/upstash-redis-adapter` before v3.0.2 are affected by this vulnerability. The Upstash Redis adapter implementation did not check for both the identifier (email) and the token, but only checking for the identifier when verifying the token in the email callback flow. An attacker who knows about the victim's email could easily sign in as the victim, given the attacker also knows about the verification token's expired duration. The vulnerability is patched in v3.0.2. A workaround is available. Using Advanced Initialization, developers can check the requests and compare the query's token and identifier before proceeding.

Category

6.8
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.10%
Third-Party Advisory github.com
Affected: nextauthjs next-auth
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2022-39263?
CVE-2022-39263 has been scored as a medium severity vulnerability.
How to fix CVE-2022-39263?
To fix CVE-2022-39263, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2022-39263 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2022-39263 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-39263?
CVE-2022-39263 affects nextauthjs next-auth.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.