CVE-2025-48370
JavaScript vulnerability analysis and mitigation

Overview

CVE-2025-48370 affects auth-js, an isomorphic Javascript library for Supabase Auth. The vulnerability was discovered and disclosed in May 2025, impacting versions prior to 2.69.1. The issue involves several library functions (getUserById, deleteUser, updateUserById, listFactors, and deleteFactor) that failed to properly validate UUID parameters, potentially leading to URL path traversal vulnerabilities (GitHub Advisory).

Technical details

The vulnerability stems from the library's failure to enforce UUID validation on user-supplied values in specific functions. This implementation weakness could result in URL path traversal, potentially causing incorrect API function calls. The vulnerability has been assigned a CVSS v4.0 score of 2.7 (LOW) with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U. The issue is classified under CWE-287 (Improper Authentication) and CWE-22 (Path Traversal) (NVD).

Impact

The vulnerability could allow attackers to manipulate API function calls through URL path traversal. However, the impact is limited to implementations that do not follow security best practices for input validation. Organizations that properly validate user-controlled inputs before passing them to the library functions are not affected by this vulnerability (GitHub Advisory).

Mitigation and workarounds

The issue has been patched in version 2.69.1, which implements strict value checks requiring valid UUID (v4) for userId and factorId parameters. As a workaround, users should implement proper input validation before passing values to the library functions. It is recommended to follow security best practices and validate all inputs before passing them to other functions or libraries (GitHub Advisory, GitHub Pull).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management