Description
In versions before and including 11.32.2, when the “additional signup fields” feature is configured, a malicious actor can inject invalidated HTML code into these additional fields, which is then stored in the service user_metdata payload (using the name property).
Verification emails, when applicable, are generated using this metadata.
Recommendation
Update the auth0-lock package to the latest compatible version. Followings are version details:
- Affected version(s): < 11.33.0
- Patched version(s): 11.33.0
References
Related Issues
- Cross site scripting in reveal.js - CVE-2022-0776
- Cross-site Scripting in Prism - CVE-2022-23647
- Joplin Desktop App vulnerable to Cross-site Scripting - CVE-2022-45598
- Cross-site Scripting in tableexport.jquery.plugin - CVE-2022-1291
- Tags:
- npm
- auth0-lock
Anything's wrong? Let us know Last updated on January 27, 2023