Description
In versions before and including 11.32.2, when the “additional signup fields” feature is configured, a malicious actor can inject invalidated HTML code into these additional fields, which is then stored in the service user_metdata payload (using the name property).
Verification emails, when applicable, are generated using this metadata.
Recommendation
Update the auth0-lock package to the latest compatible version. Followings are version details:
- Affected version(s): < 11.33.0
- Patched version(s): 11.33.0
References
Related Issues
- Cross-site Scripting in vditor - CVE-2022-0350
- Cross-site Scripting in jspreadsheet - CVE-2022-48115
- Cross-site Scripting in vditor (GHSA-pq37-4c4g-v38c) - CVE-2022-0341
- Cross-site Scripting in tableexport.jquery.plugin - CVE-2022-1291
- Tags:
- npm
- auth0-lock
Anything's wrong? Let us know Last updated on January 27, 2023