CVE-2025-67490: CWE-863: Incorrect Authorization in auth0 nextjs-auth0
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.
AI Analysis
Technical Summary
CVE-2025-67490 is an authorization vulnerability classified under CWE-863 found in the Auth0 Next.js SDK (nextjs-auth0), a widely used library for implementing user authentication in Next.js web applications. The issue affects versions 4.11.0 through 4.11.2 and 4.12.0, where simultaneous requests from the same client can cause improper lookups in the TokenRequestCache. This cache is responsible for storing token request results, and the flaw allows one request to potentially access token data intended for another request. This improper authorization can lead to exposure of sensitive authentication tokens, compromising user confidentiality. The vulnerability requires an attacker to have network access and low privileges, and user interaction is necessary, which somewhat limits exploitability. The integrity impact is low since the flaw primarily leaks data rather than allowing modification, and availability is not affected. The vulnerability has a CVSS 3.1 base score of 5.4, reflecting a medium severity level. The issue was publicly disclosed on December 10, 2025, and fixed in versions 4.11.2 and 4.12.1 of the SDK. No known exploits are currently reported in the wild. Organizations using the affected versions should upgrade promptly to mitigate the risk of unauthorized token access and potential downstream attacks leveraging leaked credentials.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of user authentication tokens in Next.js applications using the affected Auth0 SDK versions. Exposure of tokens can lead to unauthorized access to user accounts and services, potentially resulting in data breaches, privacy violations, and compliance issues under regulations like GDPR. While the vulnerability does not directly affect system integrity or availability, the unauthorized access enabled by token leakage can facilitate further attacks such as privilege escalation or lateral movement within networks. Organizations in sectors with high reliance on web applications for customer or employee authentication—such as finance, healthcare, and e-commerce—are particularly at risk. The medium severity rating indicates a moderate but actionable threat, especially in environments where multiple simultaneous authentication requests are common. Failure to patch could undermine trust in authentication mechanisms and lead to regulatory penalties if personal data is compromised.
Mitigation Recommendations
The primary mitigation is to upgrade the Auth0 Next.js SDK to versions 4.11.2 or 4.12.1, where the issue has been fixed. Organizations should audit their applications to identify usage of affected versions and prioritize patching. Additionally, developers should implement strict session management and token validation to detect and prevent token misuse. Employing rate limiting and monitoring for unusual authentication request patterns can help identify exploitation attempts. Where immediate upgrade is not feasible, isolating authentication requests or serializing token requests to avoid simultaneous cache lookups may reduce risk. Security teams should also review logs for anomalies related to token issuance and access. Finally, educating developers on secure use of authentication libraries and maintaining an up-to-date dependency management process will help prevent similar vulnerabilities.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Ireland
CVE-2025-67490: CWE-863: Incorrect Authorization in auth0 nextjs-auth0
Description
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-67490 is an authorization vulnerability classified under CWE-863 found in the Auth0 Next.js SDK (nextjs-auth0), a widely used library for implementing user authentication in Next.js web applications. The issue affects versions 4.11.0 through 4.11.2 and 4.12.0, where simultaneous requests from the same client can cause improper lookups in the TokenRequestCache. This cache is responsible for storing token request results, and the flaw allows one request to potentially access token data intended for another request. This improper authorization can lead to exposure of sensitive authentication tokens, compromising user confidentiality. The vulnerability requires an attacker to have network access and low privileges, and user interaction is necessary, which somewhat limits exploitability. The integrity impact is low since the flaw primarily leaks data rather than allowing modification, and availability is not affected. The vulnerability has a CVSS 3.1 base score of 5.4, reflecting a medium severity level. The issue was publicly disclosed on December 10, 2025, and fixed in versions 4.11.2 and 4.12.1 of the SDK. No known exploits are currently reported in the wild. Organizations using the affected versions should upgrade promptly to mitigate the risk of unauthorized token access and potential downstream attacks leveraging leaked credentials.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of user authentication tokens in Next.js applications using the affected Auth0 SDK versions. Exposure of tokens can lead to unauthorized access to user accounts and services, potentially resulting in data breaches, privacy violations, and compliance issues under regulations like GDPR. While the vulnerability does not directly affect system integrity or availability, the unauthorized access enabled by token leakage can facilitate further attacks such as privilege escalation or lateral movement within networks. Organizations in sectors with high reliance on web applications for customer or employee authentication—such as finance, healthcare, and e-commerce—are particularly at risk. The medium severity rating indicates a moderate but actionable threat, especially in environments where multiple simultaneous authentication requests are common. Failure to patch could undermine trust in authentication mechanisms and lead to regulatory penalties if personal data is compromised.
Mitigation Recommendations
The primary mitigation is to upgrade the Auth0 Next.js SDK to versions 4.11.2 or 4.12.1, where the issue has been fixed. Organizations should audit their applications to identify usage of affected versions and prioritize patching. Additionally, developers should implement strict session management and token validation to detect and prevent token misuse. Employing rate limiting and monitoring for unusual authentication request patterns can help identify exploitation attempts. Where immediate upgrade is not feasible, isolating authentication requests or serializing token requests to avoid simultaneous cache lookups may reduce risk. Security teams should also review logs for anomalies related to token issuance and access. Finally, educating developers on secure use of authentication libraries and maintaining an up-to-date dependency management process will help prevent similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-08T18:49:47.486Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6939f4c87cb4621ebe93c164
Added to database: 12/10/2025, 10:31:36 PM
Last enriched: 12/10/2025, 10:46:51 PM
Last updated: 12/11/2025, 12:54:28 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67716: CWE-184: Incomplete List of Disallowed Inputs in auth0 nextjs-auth0
MediumCVE-2025-67511: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in aliasrobotics cai
CriticalCVE-2025-67713: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in miniflux v2
MediumCVE-2025-67644: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in langchain-ai langgraph
HighCVE-2025-67646: CWE-352: Cross-Site Request Forgery (CSRF) in Telepedia TableProgressTracking
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.