CVE-2025-67716: CWE-184: Incomplete List of Disallowed Inputs in auth0 nextjs-auth0
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. Versions 4.9.0 through 4.12.1 contain an input-validation flaw in the returnTo parameter, which could allow attackers to inject unintended OAuth query parameters into the Auth0 authorization request. Successful exploitation may result in tokens being issued with unintended parameters. This issue is fixed in version 4.13.0.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-67716 affects the Auth0 Next.js SDK, a popular library used to implement user authentication in Next.js applications. Specifically, versions 4.9.0 through 4.12.1 suffer from an input-validation flaw related to the returnTo parameter. This parameter is intended to specify the URL to which users are redirected after authentication. However, due to an incomplete list of disallowed inputs (CWE-184), attackers can craft malicious returnTo values that inject unintended OAuth query parameters into the authorization request. This manipulation can cause Auth0 to issue tokens containing parameters not originally intended by the application, potentially enabling unauthorized access or privilege escalation. The vulnerability requires the attacker to have high privileges (PR:H) and user interaction (UI:R), and the attack complexity is high (AC:H), indicating that exploitation is non-trivial but feasible under certain conditions. The vulnerability impacts confidentiality and integrity but does not affect availability. No known exploits have been reported in the wild as of the publication date, and the issue is fixed in version 4.13.0 of the nextjs-auth0 SDK.
Potential Impact
For European organizations, this vulnerability poses a risk to the security of authentication tokens used in web applications built with Next.js and Auth0. If exploited, attackers could manipulate OAuth parameters to gain unauthorized access or escalate privileges within affected applications, potentially leading to data breaches or unauthorized actions. This could compromise sensitive user data and internal systems, impacting confidentiality and integrity. Organizations relying on nextjs-auth0 for critical authentication workflows may face increased risk of account takeover or session hijacking. The medium CVSS score (5.7) reflects moderate risk, but the requirement for high privileges and user interaction limits the scope of exploitation. Nonetheless, given the widespread use of Next.js and Auth0 in Europe, especially in sectors like finance, healthcare, and e-commerce, the impact could be significant if not addressed promptly.
Mitigation Recommendations
European organizations should immediately upgrade the Auth0 Next.js SDK to version 4.13.0 or later, where the vulnerability is patched. Additionally, developers should review and harden input validation logic for OAuth parameters, especially returnTo, to ensure only safe and intended URLs are accepted. Implement strict allowlists for redirect URIs and OAuth parameters to prevent injection of malicious inputs. Conduct thorough code audits and penetration testing focusing on authentication flows to detect similar issues. Employ runtime monitoring and anomaly detection to identify unusual OAuth parameter usage or token issuance patterns. Educate developers on secure OAuth implementation practices and maintain up-to-date dependencies to reduce exposure to known vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-67716: CWE-184: Incomplete List of Disallowed Inputs in auth0 nextjs-auth0
Description
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. Versions 4.9.0 through 4.12.1 contain an input-validation flaw in the returnTo parameter, which could allow attackers to inject unintended OAuth query parameters into the Auth0 authorization request. Successful exploitation may result in tokens being issued with unintended parameters. This issue is fixed in version 4.13.0.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-67716 affects the Auth0 Next.js SDK, a popular library used to implement user authentication in Next.js applications. Specifically, versions 4.9.0 through 4.12.1 suffer from an input-validation flaw related to the returnTo parameter. This parameter is intended to specify the URL to which users are redirected after authentication. However, due to an incomplete list of disallowed inputs (CWE-184), attackers can craft malicious returnTo values that inject unintended OAuth query parameters into the authorization request. This manipulation can cause Auth0 to issue tokens containing parameters not originally intended by the application, potentially enabling unauthorized access or privilege escalation. The vulnerability requires the attacker to have high privileges (PR:H) and user interaction (UI:R), and the attack complexity is high (AC:H), indicating that exploitation is non-trivial but feasible under certain conditions. The vulnerability impacts confidentiality and integrity but does not affect availability. No known exploits have been reported in the wild as of the publication date, and the issue is fixed in version 4.13.0 of the nextjs-auth0 SDK.
Potential Impact
For European organizations, this vulnerability poses a risk to the security of authentication tokens used in web applications built with Next.js and Auth0. If exploited, attackers could manipulate OAuth parameters to gain unauthorized access or escalate privileges within affected applications, potentially leading to data breaches or unauthorized actions. This could compromise sensitive user data and internal systems, impacting confidentiality and integrity. Organizations relying on nextjs-auth0 for critical authentication workflows may face increased risk of account takeover or session hijacking. The medium CVSS score (5.7) reflects moderate risk, but the requirement for high privileges and user interaction limits the scope of exploitation. Nonetheless, given the widespread use of Next.js and Auth0 in Europe, especially in sectors like finance, healthcare, and e-commerce, the impact could be significant if not addressed promptly.
Mitigation Recommendations
European organizations should immediately upgrade the Auth0 Next.js SDK to version 4.13.0 or later, where the vulnerability is patched. Additionally, developers should review and harden input validation logic for OAuth parameters, especially returnTo, to ensure only safe and intended URLs are accepted. Implement strict allowlists for redirect URIs and OAuth parameters to prevent injection of malicious inputs. Conduct thorough code audits and penetration testing focusing on authentication flows to detect similar issues. Employ runtime monitoring and anomaly detection to identify unusual OAuth parameter usage or token issuance patterns. Educate developers on secure OAuth implementation practices and maintain up-to-date dependencies to reduce exposure to known vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-10T17:47:36.418Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693a149dbbbecd30a6dedd3e
Added to database: 12/11/2025, 12:47:25 AM
Last enriched: 12/18/2025, 4:57:10 AM
Last updated: 2/6/2026, 5:20:00 AM
Views: 146
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1990: NULL Pointer Dereference in oatpp
MediumCVE-2026-1979: Use After Free in mruby
MediumCVE-2026-1978: Direct Request in kalyan02 NanoCMS
MediumCVE-2026-25698
LowCVE-2026-25697
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.