{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T00:20:40.629","vulnerabilities":[{"cve":{"id":"CVE-2022-31093","sourceIdentifier":"security-advisories@github.com","published":"2022-06-27T22:15:09.047","lastModified":"2024-11-21T07:03:52.837","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NextAuth.js is a complete open source authentication solution for Next.js applications. In affected versions an attacker can send a request to an app using NextAuth.js with an invalid `callbackUrl` query parameter, which internally is converted to a `URL` object. The URL instantiation would fail due to a malformed URL being passed into the constructor, causing it to throw an unhandled error which led to the **API route handler timing out and logging in to fail**. This has been remedied in versions 3.29.5 and 4.5.0. If for some reason you cannot upgrade, the workaround requires you to rely on Advanced Initialization. Please see the documentation for more."},{"lang":"es","value":"NextAuth.js es una solución completa de autenticación de código abierto para aplicaciones Next.js. En las versiones afectadas, un atacante puede enviar una petición a una aplicación usando NextAuth.js con un parámetro de consulta \"callbackUrl\" no válido, que internamente es convertido en un objeto \"URL\". La instanciación de la URL fallaba debido a que era pasada una URL malformada al constructor, lo que causaba que fuera lanzado un error no manejado que conllevaba a que el **manejador de rutas de la API se desconectara y el inicio de sesión fallara**. Esto ha sido remediado en versiones 3.29.5 y 4.5.0. Si por alguna razón no puedes actualizar, la mitigación requiere que te apoyes en la Inicialización Avanzada. Consulte la documentación para obtener más información"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-754"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nextauth.js:next-auth:*:*:*:*:*:node.js:*:*","versionStartIncluding":"3.0.0","versionEndExcluding":"3.29.5","matchCriteriaId":"9433E695-3D8D-4D49-B349-C3C68F013FEE"},{"vulnerable":true,"criteria":"cpe:2.3:a:nextauth.js:next-auth:*:*:*:*:*:node.js:*:*","versionStartIncluding":"4.0.0","versionEndExcluding":"4.5.0","matchCriteriaId":"6D08EEB4-7815-4127-B2CA-BE4B4258D8CD"}]}]}],"references":[{"url":"https://github.com/nextauthjs/next-auth/commit/25517b73153332d948114bacdff3b5908de91d85","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/nextauthjs/next-auth/commit/e498483b23273d1bfc81be68339607f88d411bd6","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/nextauthjs/next-auth/security/advisories/GHSA-g5fm-jp9v-2432","source":"security-advisories@github.com","tags":["Mitigation","Third Party Advisory"]},{"url":"https://next-auth.js.org/configuration/initialization#advanced-initialization","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/nextauthjs/next-auth/commit/25517b73153332d948114bacdff3b5908de91d85","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/nextauthjs/next-auth/commit/e498483b23273d1bfc81be68339607f88d411bd6","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/nextauthjs/next-auth/security/advisories/GHSA-g5fm-jp9v-2432","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Third Party Advisory"]},{"url":"https://next-auth.js.org/configuration/initialization#advanced-initialization","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}