CVE-2025-48370: CWE-287: Improper Authentication in supabase auth-js
auth-js is an isomorphic Javascript library for Supabase Auth. Prior to version 2.69.1, the library functions getUserById, deleteUser, updateUserById, listFactors and deleteFactor did not require the user supplied values to be valid UUIDs. This could lead to a URL path traversal, resulting in the wrong API function being called. Implementations that follow security best practice and validate user controlled inputs, such as the userId are not affected by this. This issue has been patched in version 2.69.1.
AI Analysis
Technical Summary
CVE-2025-48370 is a vulnerability identified in the supabase auth-js library, an isomorphic JavaScript library used for Supabase authentication. The issue affects versions prior to 2.69.1 and involves improper authentication due to insufficient validation of user-supplied UUID inputs in several key functions: getUserById, deleteUser, updateUserById, listFactors, and deleteFactor. Specifically, these functions did not enforce that the user-supplied values were valid UUIDs, allowing attackers to exploit this by crafting inputs that could lead to URL path traversal. This path traversal could cause the API to invoke unintended functions, potentially exposing or manipulating data incorrectly. The vulnerability is classified under CWE-287 (Improper Authentication) and CWE-22 (Path Traversal). The flaw does not require authentication or user interaction and can be exploited remotely over the network. However, the impact is limited due to the nature of the flaw and the requirement that implementations not following best practices for input validation are vulnerable. The issue has been addressed and patched in version 2.69.1 of auth-js. The CVSS 4.0 base score is 2.7, indicating a low severity vulnerability, reflecting limited impact on confidentiality, integrity, and availability. No known exploits are reported in the wild at this time.
Potential Impact
For European organizations using Supabase's auth-js library versions prior to 2.69.1, this vulnerability could allow attackers to manipulate API calls by exploiting improper input validation, potentially leading to unauthorized access or modification of user authentication data. While the severity is low, the risk increases if the affected implementations do not perform their own input validation, which is a recommended security best practice. The impact could include unauthorized user data exposure or manipulation of authentication factors, which may undermine trust in identity management systems. Given that Supabase is popular among startups and developers for backend services, organizations relying on this library for critical authentication workflows could face disruptions or data integrity issues if exploited. However, the low CVSS score and absence of known exploits suggest the immediate risk is limited. Still, organizations in sectors with strict data protection regulations, such as finance or healthcare, should prioritize patching to maintain compliance and security posture.
Mitigation Recommendations
European organizations should immediately upgrade the supabase auth-js library to version 2.69.1 or later to remediate this vulnerability. Additionally, they should implement strict validation of all user-supplied inputs, especially UUIDs used in authentication-related API calls, to ensure they conform to expected formats before processing. Employing input validation libraries or regex checks for UUID format can prevent path traversal attacks. Organizations should also conduct code audits and penetration testing focused on authentication workflows to detect any similar weaknesses. Monitoring API logs for unusual or malformed requests targeting authentication endpoints can help detect exploitation attempts. Finally, integrating runtime application self-protection (RASP) or web application firewalls (WAF) with rules targeting path traversal patterns can provide an additional layer of defense.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland
CVE-2025-48370: CWE-287: Improper Authentication in supabase auth-js
Description
auth-js is an isomorphic Javascript library for Supabase Auth. Prior to version 2.69.1, the library functions getUserById, deleteUser, updateUserById, listFactors and deleteFactor did not require the user supplied values to be valid UUIDs. This could lead to a URL path traversal, resulting in the wrong API function being called. Implementations that follow security best practice and validate user controlled inputs, such as the userId are not affected by this. This issue has been patched in version 2.69.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-48370 is a vulnerability identified in the supabase auth-js library, an isomorphic JavaScript library used for Supabase authentication. The issue affects versions prior to 2.69.1 and involves improper authentication due to insufficient validation of user-supplied UUID inputs in several key functions: getUserById, deleteUser, updateUserById, listFactors, and deleteFactor. Specifically, these functions did not enforce that the user-supplied values were valid UUIDs, allowing attackers to exploit this by crafting inputs that could lead to URL path traversal. This path traversal could cause the API to invoke unintended functions, potentially exposing or manipulating data incorrectly. The vulnerability is classified under CWE-287 (Improper Authentication) and CWE-22 (Path Traversal). The flaw does not require authentication or user interaction and can be exploited remotely over the network. However, the impact is limited due to the nature of the flaw and the requirement that implementations not following best practices for input validation are vulnerable. The issue has been addressed and patched in version 2.69.1 of auth-js. The CVSS 4.0 base score is 2.7, indicating a low severity vulnerability, reflecting limited impact on confidentiality, integrity, and availability. No known exploits are reported in the wild at this time.
Potential Impact
For European organizations using Supabase's auth-js library versions prior to 2.69.1, this vulnerability could allow attackers to manipulate API calls by exploiting improper input validation, potentially leading to unauthorized access or modification of user authentication data. While the severity is low, the risk increases if the affected implementations do not perform their own input validation, which is a recommended security best practice. The impact could include unauthorized user data exposure or manipulation of authentication factors, which may undermine trust in identity management systems. Given that Supabase is popular among startups and developers for backend services, organizations relying on this library for critical authentication workflows could face disruptions or data integrity issues if exploited. However, the low CVSS score and absence of known exploits suggest the immediate risk is limited. Still, organizations in sectors with strict data protection regulations, such as finance or healthcare, should prioritize patching to maintain compliance and security posture.
Mitigation Recommendations
European organizations should immediately upgrade the supabase auth-js library to version 2.69.1 or later to remediate this vulnerability. Additionally, they should implement strict validation of all user-supplied inputs, especially UUIDs used in authentication-related API calls, to ensure they conform to expected formats before processing. Employing input validation libraries or regex checks for UUID format can prevent path traversal attacks. Organizations should also conduct code audits and penetration testing focused on authentication workflows to detect any similar weaknesses. Monitoring API logs for unusual or malformed requests targeting authentication endpoints can help detect exploitation attempts. Finally, integrating runtime application self-protection (RASP) or web application firewalls (WAF) with rules targeting path traversal patterns can provide an additional layer of defense.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-05-19T15:46:00.395Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6835dda5182aa0cae2186689
Added to database: 5/27/2025, 3:43:33 PM
Last enriched: 7/6/2025, 3:26:42 AM
Last updated: 8/13/2025, 3:33:13 PM
Views: 32
Related Threats
CVE-2025-8937: Command Injection in TOTOLINK N350R
MediumCVE-2025-8936: SQL Injection in 1000 Projects Sales Management System
MediumCVE-2025-5942: CWE-122 Heap-based Buffer Overflow in Netskope Netskope Client
MediumCVE-2025-5941: CWE-125 Out-of-Bounds Read in Netskope Netskope Client
LowCVE-2025-0309: Vulnerability in Netskope Netskope Client
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.