#VU83351 Incorrect authorization in next-auth - CVE-2022-35924
Published: November 21, 2023
next-auth
NextAuth.js
Description
The vulnerability allows a remote attacker to bypass authorization process.
The vulnerability exists due to the way NextAuth.js send verification requests using the EmailProvider. If an attacker can forge a request that sends a comma-separated list of emails, the verification token is sent to both email addresses (e.g. attacker@attacker.com,victim@victim.com). In such case the login name will consist of both email addresses. however the email notification will be sent to both emails.