Description
In versions before and including 11.32.2
, when the “additional signup fields” feature is configured, a malicious actor can inject invalidated HTML code into these additional fields, which is then stored in the service user_metdata
payload (using the name
property).
Verification emails, when applicable, are generated using this metadata.
Recommendation
Update the auth0-lock
package to the latest compatible version. Followings are version details:
- Affected version(s): < 11.33.0
- Patched version(s): 11.33.0
References
Related Issues
- DOMpurify has a nesting-based mXSS - CVE-2024-47875
- Path Traversal in simplehttpserver - CVE-2018-16478
- Cross-Site Scripting in html-pages - CVE-2018-16481
- Path Traversal in http-server-node - CVE-2021-23797
- Tags:
- npm
- auth0-lock
Anything's wrong? Let us know Last updated on January 27, 2023