Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67716: CWE-184: Incomplete List of Disallowed Inputs in auth0 nextjs-auth0

0
Medium
VulnerabilityCVE-2025-67716cvecve-2025-67716cwe-184
Published: Thu Dec 11 2025 (12/11/2025, 00:21:27 UTC)
Source: CVE Database V5
Vendor/Project: auth0
Product: nextjs-auth0

Description

The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. Versions 4.9.0 through 4.12.1 contain an input-validation flaw in the returnTo parameter, which could allow attackers to inject unintended OAuth query parameters into the Auth0 authorization request. Successful exploitation may result in tokens being issued with unintended parameters. This issue is fixed in version 4.13.0.

AI-Powered Analysis

AILast updated: 12/18/2025, 04:57:10 UTC

Technical Analysis

The vulnerability identified as CVE-2025-67716 affects the Auth0 Next.js SDK, a popular library used to implement user authentication in Next.js applications. Specifically, versions 4.9.0 through 4.12.1 suffer from an input-validation flaw related to the returnTo parameter. This parameter is intended to specify the URL to which users are redirected after authentication. However, due to an incomplete list of disallowed inputs (CWE-184), attackers can craft malicious returnTo values that inject unintended OAuth query parameters into the authorization request. This manipulation can cause Auth0 to issue tokens containing parameters not originally intended by the application, potentially enabling unauthorized access or privilege escalation. The vulnerability requires the attacker to have high privileges (PR:H) and user interaction (UI:R), and the attack complexity is high (AC:H), indicating that exploitation is non-trivial but feasible under certain conditions. The vulnerability impacts confidentiality and integrity but does not affect availability. No known exploits have been reported in the wild as of the publication date, and the issue is fixed in version 4.13.0 of the nextjs-auth0 SDK.

Potential Impact

For European organizations, this vulnerability poses a risk to the security of authentication tokens used in web applications built with Next.js and Auth0. If exploited, attackers could manipulate OAuth parameters to gain unauthorized access or escalate privileges within affected applications, potentially leading to data breaches or unauthorized actions. This could compromise sensitive user data and internal systems, impacting confidentiality and integrity. Organizations relying on nextjs-auth0 for critical authentication workflows may face increased risk of account takeover or session hijacking. The medium CVSS score (5.7) reflects moderate risk, but the requirement for high privileges and user interaction limits the scope of exploitation. Nonetheless, given the widespread use of Next.js and Auth0 in Europe, especially in sectors like finance, healthcare, and e-commerce, the impact could be significant if not addressed promptly.

Mitigation Recommendations

European organizations should immediately upgrade the Auth0 Next.js SDK to version 4.13.0 or later, where the vulnerability is patched. Additionally, developers should review and harden input validation logic for OAuth parameters, especially returnTo, to ensure only safe and intended URLs are accepted. Implement strict allowlists for redirect URIs and OAuth parameters to prevent injection of malicious inputs. Conduct thorough code audits and penetration testing focusing on authentication flows to detect similar issues. Employ runtime monitoring and anomaly detection to identify unusual OAuth parameter usage or token issuance patterns. Educate developers on secure OAuth implementation practices and maintain up-to-date dependencies to reduce exposure to known vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-10T17:47:36.418Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693a149dbbbecd30a6dedd3e

Added to database: 12/11/2025, 12:47:25 AM

Last enriched: 12/18/2025, 4:57:10 AM

Last updated: 2/6/2026, 5:20:00 AM

Views: 146

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats