CVE-2022-39263
JavaScript vulnerability analysis and mitigation

Overview

The vulnerability (CVE-2022-39263) affects the Upstash Redis adapter (@next-auth/upstash-redis-adapter) for NextAuth.js, which provides authentication for Next.js applications. The issue was discovered and disclosed on September 28, 2022, affecting versions prior to 3.0.2. The vulnerability stems from an implementation flaw in the email verification process where the adapter only checked for the identifier (email) without properly verifying the token during the email callback flow (GitHub Advisory).

Technical details

The vulnerability exists in the email verification process of the Upstash Redis adapter. The implementation failed to verify both the identifier (email) and token simultaneously, instead only checking the identifier during the email callback flow. The vulnerability has been assigned a CVSS v3.1 base score of 6.8 (Moderate), with attack vector being Network, attack complexity High, requiring no privileges but user interaction, and affecting both confidentiality and integrity while not impacting availability (GitHub Advisory).

Impact

The vulnerability could allow an attacker who knows the victim's email address and the verification token's expired duration to successfully sign in as the victim. This poses a significant security risk as it could lead to unauthorized account access and potential impersonation of legitimate users (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 3.0.2 of the @next-auth/upstash-redis-adapter. Users are strongly recommended to upgrade to this version using package managers (npm, yarn, or pnpm). As a temporary workaround, developers can implement Advanced Initialization to manually check and compare the query's token and identifier before proceeding with the authentication process (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67731HIGH8.7
  • JavaScriptJavaScript
  • servify-express
NoYesDec 12, 2025
CVE-2025-67718HIGH8.7
  • JavaScriptJavaScript
  • formio
NoYesDec 11, 2025
CVE-2025-65513HIGH7.5
  • JavaScriptJavaScript
  • mcp-fetch-server
NoNoDec 09, 2025
CVE-2025-67716MEDIUM5.7
  • JavaScriptJavaScript
  • @auth0/nextjs-auth0
NoYesDec 11, 2025
CVE-2025-67490MEDIUM5.4
  • JavaScriptJavaScript
  • @auth0/nextjs-auth0
NoYesDec 10, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management