CVE-2024-22206
JavaScript vulnerability analysis and mitigation

Overview

CVE-2024-22206 is a critical security vulnerability discovered in the @clerk/nextjs SDK, affecting versions 4.7.0 to 4.29.2. The vulnerability was identified on January 9, 2024, and allows malicious actors to gain privileged access or act-on-behalf-of other users in applications using Next.js backend, specifically those that call auth() in the App Router or getAuth() in the Pages Router (Clerk Changelog, GitHub Advisory).

Technical details

The vulnerability stems from a logic flaw in the auth() function in the App Router and getAuth() function in the Pages Router, leading to an insecure direct object reference (IDOR) issue. The vulnerability only impacts applications that use Next.js for backend functionality, while applications using Next.js solely for frontend and middleware functionality are not affected. The CVSS v3.1 score is 9.8 (Critical) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

The vulnerability enables unauthorized access and privilege escalation, potentially allowing attackers to gain privileged access or impersonate other users in affected applications. While no known exploits have been reported, the severity of the vulnerability prompted immediate action from cloud infrastructure providers (Clerk Changelog).

Mitigation and workarounds

The vulnerability has been patched in version 4.29.3 of @clerk/nextjs. Immediate upgrade to this version is strongly recommended. Additionally, major cloud providers (Vercel, Netlify, and Cloudflare) have implemented temporary network-layer mitigations to protect applications. For detailed investigation of potential exploits, affected customers can request log inspection instructions by contacting security@clerk.dev (Clerk Changelog).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-59532HIGH8.6
  • JavaScriptJavaScript
  • @openai/codex
NoYesSep 22, 2025
CVE-2025-59430HIGH8.2
  • JavaScriptJavaScript
  • @meshconnect/web-link-sdk
NoYesSep 22, 2025
CVE-2025-59433MEDIUM5.3
  • JavaScriptJavaScript
  • @conventional-changelog/git-client
NoYesSep 22, 2025
CVE-2025-59526LOW2.7
  • JavaScriptJavaScript
  • mailgen
NoYesSep 22, 2025
GHSA-g38c-wxjf-xrh6HIGHN/A
  • JavaScriptJavaScript
  • git-commiters
NoYesSep 22, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management