<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Auth0 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/auth0/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 23 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/auth0/feed.xml" rel="self" type="application/rss+xml"/><item><title>Auth0.js SDK Improper Permission Checking Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-auth0-sdk-bypass/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-auth0-sdk-bypass/</guid><description>The Auth0.js SDK versions 8.11.0 to 9.32.0 improperly returns user profile information when provided a crafted invalid ID token, potentially bypassing access controls relying on Auth0 Actions.</description><content:encoded><![CDATA[<p>The Auth0.js SDK, specifically versions 8.11.0 through 9.32.0, contains a vulnerability (CVE-2026-42280) where it may improperly return user profile information even when presented with a specially crafted invalid ID token. This occurs when specific preconditions are met, namely when applications are built using the affected Auth0.js SDK versions and their access control mechanisms are heavily reliant on rules defined within Auth0 Actions. An attacker could potentially exploit this vulnerability to bypass intended access controls and gain unauthorized access to user profile data. This poses a significant risk to applications utilizing the SDK for authentication and authorization.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an application utilizing Auth0.js SDK version 8.11.0 to 9.32.0 and relying on Auth0 Actions for access control.</li>
<li>Attacker crafts a malicious, invalid ID token specifically designed to exploit the permission checking vulnerability.</li>
<li>Attacker authenticates to the application using valid credentials, obtaining a valid access token.</li>
<li>Attacker intercepts or modifies the authentication flow to replace the legitimate ID token with the crafted, malicious ID token.</li>
<li>The Auth0.js SDK, due to the vulnerability, processes the crafted ID token without proper validation, associating it with the valid access token.</li>
<li>The application queries the Auth0.js SDK for the user profile information.</li>
<li>The Auth0.js SDK, trusting the association between the access token and the crafted ID token, returns user profile information, potentially bypassing Auth0 Actions rules.</li>
<li>Attacker gains unauthorized access to user profile data, potentially leading to further exploitation or data breaches.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-42280 can lead to unauthorized access to user profile information within applications using vulnerable versions of the Auth0.js SDK. If an application&rsquo;s access control relies heavily on Auth0 Actions, attackers can bypass these rules and potentially escalate privileges or access sensitive data. The number of affected applications is currently unknown, but any application meeting the specified preconditions is at risk. The vulnerability was responsibly disclosed by Quan Le (@aleister1102)</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the auth0/auth0.js SDK to version 10.0.0 or greater to remediate CVE-2026-42280.</li>
<li>Review and harden access control rules defined in Auth0 Actions to mitigate potential bypasses.</li>
<li>Monitor application logs for suspicious authentication attempts or unusual access patterns related to user profiles.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>auth0</category><category>sdk</category><category>vulnerability</category><category>authentication</category></item></channel></rss>