Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67716: CWE-184: Incomplete List of Disallowed Inputs in auth0 nextjs-auth0

0
Medium
VulnerabilityCVE-2025-67716cvecve-2025-67716cwe-184
Published: Thu Dec 11 2025 (12/11/2025, 00:21:27 UTC)
Source: CVE Database V5
Vendor/Project: auth0
Product: nextjs-auth0

Description

The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. Versions 4.9.0 through 4.12.1 contain an input-validation flaw in the returnTo parameter, which could allow attackers to inject unintended OAuth query parameters into the Auth0 authorization request. Successful exploitation may result in tokens being issued with unintended parameters. This issue is fixed in version 4.13.0.

AI-Powered Analysis

AILast updated: 12/11/2025, 01:02:00 UTC

Technical Analysis

The vulnerability identified as CVE-2025-67716 affects the Auth0 Next.js SDK, a popular library used to implement user authentication in Next.js applications. Specifically, versions from 4.9.0 up to but not including 4.13.0 suffer from an input-validation flaw in the handling of the returnTo parameter. This parameter is intended to specify the URL to which users are redirected after authentication. However, due to an incomplete list of disallowed inputs (CWE-184), attackers can inject additional OAuth query parameters into the authorization request by manipulating the returnTo value. This injection can cause the Auth0 authorization server to issue tokens containing unintended or malicious parameters, potentially allowing attackers to escalate privileges, bypass intended authorization constraints, or redirect users to malicious endpoints. The vulnerability requires the attacker to have high privileges (PR:H) and involves user interaction (UI:R), making exploitation more complex but still feasible in targeted scenarios. The CVSS v3.1 base score is 5.7, reflecting medium severity with high impact on confidentiality and integrity but no impact on availability. The flaw was addressed and fixed in version 4.13.0 of the SDK. No known exploits are currently reported in the wild, but the risk remains significant for applications using vulnerable versions.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality and integrity of authentication tokens issued by Auth0 when used with Next.js applications. Successful exploitation could allow attackers to manipulate OAuth tokens, potentially leading to unauthorized access to sensitive systems or data. This is particularly concerning for industries with strict data protection requirements such as finance, healthcare, and government sectors. The flaw could also facilitate phishing or session hijacking attacks by redirecting users to malicious URLs post-authentication. Since many European companies rely on cloud-based identity providers like Auth0 for secure authentication, the vulnerability could have widespread implications if not promptly addressed. The requirement for high privileges and user interaction somewhat limits the attack surface but does not eliminate the risk, especially in environments with complex user roles or where insider threats exist.

Mitigation Recommendations

The primary mitigation is to upgrade the Auth0 Next.js SDK to version 4.13.0 or later, where the input validation flaw is corrected. Organizations should audit their applications to identify usage of the returnTo parameter and ensure that any user-supplied inputs are strictly validated and sanitized against a comprehensive whitelist of allowed URLs or parameters. Implementing additional server-side checks to verify the legitimacy of OAuth parameters before processing can reduce risk. Monitoring authentication logs for unusual parameter patterns or unexpected redirects can help detect exploitation attempts. Security teams should also educate developers about secure OAuth implementation practices and conduct regular dependency reviews to promptly apply security patches. Finally, consider implementing multi-factor authentication and anomaly detection to mitigate potential impacts from compromised tokens.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-10T17:47:36.418Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693a149dbbbecd30a6dedd3e

Added to database: 12/11/2025, 12:47:25 AM

Last enriched: 12/11/2025, 1:02:00 AM

Last updated: 12/11/2025, 2:00:33 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats