Description
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. In versions 4.12.0 through 4.17.1, simultaneous requests that trigger a nonce retry may cause the proxy cache fetcher to perform improper lookups for the token request results. Users are affected if their project uses both the vulnerable versions and the proxy handler /me/* and /my-org/* with DPoP enabled. This issue has been fixed in version 4.18.0.
Published: 2026-04-17
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Potential unauthorized authentication via improper token lookup
Action: Apply Patch
AI Analysis

Impact

This vulnerability is a race condition in the Auth0 Next.js SDK’s proxy cache fetcher; concurrent requests that retry a nonce can trigger an improper cache lookup, causing the SDK to retrieve the wrong token result. The flaw is a concurrency error (CWE‑362) combined with misused cache logic (CWE‑863). Although the CVE does not describe a remote code execution, the broken authentication flow can expose or reuse authentication tokens and lead to unauthorized access or data leakage. The integrity of user sessions may be fully compromised if an attacker can obtain a valid token.

Affected Systems

The issue exists in Auth0 Next.js SDK versions 4.12.0 through 4.17.1. Applications must be using the SDK together with the proxy handler routes /me/* and /my-org/* with DPoP enabled to be vulnerable. Affected systems are any Next.js web applications that depend on the vulnerable Auth0 SDK. The bug has been addressed in SDK release 4.18.0, so upgrading beyond that version removes the risk.

Risk and Exploitability

The CVSS base score is 5.4, reflecting a moderate severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog, so the probability of exploitation is unclear. The attack vector appears to be local within the application: an attacker can trigger the race condition by issuing simultaneous nonce‑retry requests or by logging in multiple times in quick succession when the proxy handler and DPoP are enabled. Because the flaw requires specific routing and configuration, the exploitability is limited to deployments that match the described pattern but still poses a meaningful risk if such deployments are commonly used.

Generated by OpenCVE AI on April 18, 2026 at 17:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Auth0 Next.js SDK to version 4.18.0 or later to eliminate the race condition in the proxy cache fetcher.
  • Reconfigure or disable DPoP for the /me/* and /my-org/* routes if those features are not required, or ensure that any DPoP usage does not involve simultaneous nonce retries.
  • Implement rate limiting on authentication endpoints to reduce the likelihood of concurrent nonce retries that trigger the race condition.

Generated by OpenCVE AI on April 18, 2026 at 17:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xq8m-7c5p-c2r6 Auth0 Next.js SDK has Improper Proxy Cache Lookup
History

Mon, 27 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:auth0:nextjs-auth0:*:*:*:*:*:node.js:*:*

Mon, 20 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 17 Apr 2026 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Auth0
Auth0 nextjs-auth0
Vendors & Products Auth0
Auth0 nextjs-auth0

Fri, 17 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Description The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. In versions 4.12.0 through 4.17.1, simultaneous requests that trigger a nonce retry may cause the proxy cache fetcher to perform improper lookups for the token request results. Users are affected if their project uses both the vulnerable versions and the proxy handler /me/* and /my-org/* with DPoP enabled. This issue has been fixed in version 4.18.0.
Title Auth0 Next.js SDK has Improper Proxy Cache Lookup
Weaknesses CWE-362
CWE-863
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N'}


Subscriptions

Auth0 Nextjs-auth0
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-20T14:57:32.023Z

Reserved: 2026-04-09T19:31:56.013Z

Link: CVE-2026-40155

cve-icon Vulnrichment

Updated: 2026-04-20T14:51:34.467Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-17T21:16:33.713

Modified: 2026-04-27T19:41:13.397

Link: CVE-2026-40155

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T17:15:05Z

Weaknesses