<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cloudflare — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/cloudflare/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 15 May 2026 17:43:06 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/cloudflare/feed.xml" rel="self" type="application/rss+xml"/><item><title>Better Auth Rate Limiter Bypass via IPv6 Prefix Rotation (CVE-2026-45364)</title><link>https://feed.craftedsignal.io/briefs/2026-05-better-auth-rate-limit-bypass/</link><pubDate>Fri, 15 May 2026 17:43:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-better-auth-rate-limit-bypass/</guid><description>Better Auth versions before 1.4.17 and pre-release versions before 1.5.0-beta.9 are vulnerable to CVE-2026-45364, a rate-limiting bypass that allows IPv6 clients to rotate through numerous source addresses or vary the textual encoding of one IPv6 address, effectively defeating rate limiting on authentication endpoints, potentially leading to credential stuffing, account enumeration, and amplification of password-reset email fan-out.</description><content:encoded><![CDATA[<p>Better Auth, a Node.js authentication library, is vulnerable to a rate-limiting bypass (CVE-2026-45364) affecting versions before 1.4.17 and pre-release versions before 1.5.0-beta.9. The vulnerability stems from the rate limiter keying requests by the exact textual IP address, allowing IPv6 clients to circumvent rate limits by rotating through numerous source addresses or manipulating the textual encoding of a single IPv6 address. This bypass impacts authentication endpoints like <code>/sign-in/email</code>, <code>/sign-up/email</code>, and <code>/forget-password</code>, making them susceptible to abuse. The issue was addressed in version 1.4.17 by introducing IP address normalization, which involves expanding compressed IPv6 forms, lowercasing hex digits, collapsing IPv4-mapped IPv6 to plain IPv4, and applying a default <code>/64</code> prefix mask. Managed hosts including Cloudflare, Vercel, Fly.io, AWS Application Load Balancer, and Google Cloud Load Balancing advertise IPv6 by default, increasing the attack surface.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an authentication endpoint (e.g., <code>/sign-in/email</code>) protected by Better Auth&rsquo;s rate limiter.</li>
<li>The attacker sends a request to the authentication endpoint from an IPv6 address.</li>
<li>The Better Auth rate limiter extracts the leftmost <code>x-forwarded-for</code> value without proper normalization.</li>
<li>The attacker rotates the source IPv6 address within their assigned prefix (e.g., a /64 allocation) or modifies the textual encoding of the IPv6 address (e.g., using compressed or mixed forms).</li>
<li>The attacker sends a subsequent request to the same endpoint, using the rotated or modified IPv6 address.</li>
<li>The rate limiter treats the new IPv6 address as a distinct client due to the lack of normalization.</li>
<li>The attacker repeats steps 4-6 to bypass the rate limit and make unlimited authentication attempts.</li>
<li>The attacker performs credential stuffing, account enumeration, or password-reset amplification attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to bypass rate limiting on authentication endpoints. This can lead to credential stuffing attacks against <code>/sign-in/email</code>, enabling unauthorized access to user accounts. Account enumeration becomes easier due to the ability to make unlimited requests without being rate limited. Furthermore, attackers can amplify password-reset and email-verification email fan-out, potentially overwhelming email systems and causing denial of service. While this vulnerability does not directly compromise accounts, it weakens the defense-in-depth and increases the risk of successful attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>better-auth@1.4.17</code> or later to apply the fix that normalizes IPv6 addresses, mitigating the rate-limiting bypass (see Patches section).</li>
<li>If upgrading is not immediately feasible, and you are on <code>&gt;= 1.4.16</code>, set <code>advanced.ipAddress.ipv6Subnet: 64</code> in the auth configuration to restore post-<code>1.4.17</code> behavior (see Workarounds section).</li>
<li>For versions <code>&lt; 1.4.16</code>, shift the bypass mitigation upstream by configuring IPv6 prefix length limiting on your CDN, WAF, or load balancer to <code>/64</code> (or coarser per RFC 6177) (see Workarounds section).</li>
<li>Deploy the Sigma rule &ldquo;Detect High Volume Authentication Attempts from Single IPv6 /64 Prefix (CVE-2026-45364)&rdquo; to identify potential exploitation attempts by monitoring authentication logs for excessive attempts from the same /64 IPv6 subnet (see Rules section).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>rate-limiting</category><category>authentication</category><category>ipv6</category><category>cve-2026-45364</category></item></channel></rss>