Wiz Agents & Workflows are here
Vulnerability DatabaseGHSA-5jpx-9hw9-2fx4

GHSA-5jpx-9hw9-2fx4
JavaScript vulnerability analysis and mitigation

Overview

NextAuth.js's email sign-in functionality was found to contain a vulnerability (GHSA-5jpx-9hw9-2fx4) that could allow authentication emails to be misdirected to attacker-controlled mailboxes. The vulnerability affects NextAuth.js versions up to 4.24.11 and 5.0.0-beta.29, and was discovered and disclosed in October 2025 (GitHub Advisory).

Technical details

The vulnerability stems from a bug in nodemailer's address parser (versions prior to 7.0.7) used by NextAuth.js. When processing email addresses, the parser incorrectly handles specially crafted inputs containing multiple @ symbols. For example, an input like '"e@attacker.com"@victim.com' would be parsed incorrectly, resulting in the email being delivered to e@attacker.com instead of the intended recipient at victim.com, violating RFC 5321/5322 semantics. The vulnerability has been assigned a CVSS v4 score of 6.9 (Moderate severity) (GitHub Advisory).

Impact

The vulnerability allows attackers to intercept authentication emails intended for legitimate users. By exploiting this flaw, attackers can receive login verification links and other sensitive emails meant for victims, potentially leading to unauthorized account access (GitHub Advisory).

Mitigation and workarounds

The primary mitigation is to update to patched versions of NextAuth.js (4.24.12 or 5.0.0-beta.30) and ensure nodemailer is updated to version 7.0.7 or later. The fix includes improved email address validation and parsing logic to prevent email misdelivery (GitHub Advisory, NextAuth Commit).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-34156CRITICAL9.9
  • JavaScriptJavaScript
  • @nocobase/plugin-workflow-javascript
NoYesMar 30, 2026
CVE-2026-34363HIGH8.2
  • JavaScriptJavaScript
  • parse-server
NoYesMar 30, 2026
CVE-2026-33949HIGH8.1
  • JavaScriptJavaScript
  • @tinacms/graphql
NoYesMar 30, 2026
CVE-2026-34043MEDIUM5.9
  • JavaScriptJavaScript
  • serialize-javascript
NoYesMar 31, 2026
CVE-2026-34373MEDIUM5.3
  • JavaScriptJavaScript
  • parse-server
NoYesMar 30, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management