Loading HuntDB...

GHSA-prfq-f66g-43mp

GitHub Security Advisory

Information disclosure through error object in auth0.js

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

## Overview
Between versions 8.0.0 and 9.13.1(inclusive), in the case of an (authentication) error, the error object returned by the library contains the original request of the user, which may include the plaintext password the user entered.

If the error object is exposed or logged without modification, the application risks password exposure.

## Am I affected?
You are affected by this vulnerability if all of the following conditions apply:

- You are using Auth0.js version between 8.0.0 and 9.13.1(inclusive).
- You store or display error objects without filtering.

## How to fix that?
Developers should upgrade auth0.js to version 9.13.2 or later where user inputted passwords are masked in errors. If upgrading is not possible, a temporary fix may include not storing the error object or displaying it publicly without modification.

## Will this update impact my users?

This fix patches the Auth0.js and may require changes in application code due to password no longer available in error object, but it will not impact your users, their current state, or any existing sessions.

Affected Packages

npm auth0-js
Affected versions: 8.0.0 (fixed in 9.13.2)

Related CVEs

Key Information

GHSA ID
GHSA-prfq-f66g-43mp
Published
April 10, 2020 6:19 PM
Last Modified
January 8, 2021 8:23 PM
CVSS Score
7.5 /10
Primary Ecosystem
npm
Primary Package
auth0-js
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 12, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.