Description
Between versions 8.0.0 and 9.13.1(inclusive), in the case of an (authentication) error, the error object returned by the library contains the original request of the user, which may include the plaintext password the user entered.
If the error object is exposed or logged without modification, the application risks password exposure.
Recommendation
Update the auth0-js package to the latest compatible version. Followings are version details:
- Affected version(s): >= 8.0.0, < 9.13.2
- Patched version(s): 9.13.2
References
Related Issues
- Information disclosure in parse-server - CVE-2020-5251
- Signal K Server Vulnerable to Unauthenticated Information Disclosure via Exposed Endpoints - CVE-2025-68273
- angular-server-side-configuration information disclosure vulnerability in monorepo with node.js backend - CVE-2023-28444
- Auth0-js bypasses CSRF checks - CVE-2018-7307
- Tags:
- npm
- auth0-js
Anything's wrong? Let us know Last updated on January 09, 2023