Vulnerability Details : CVE-2021-32641
auth0-lock is Auth0's signin solution. Versions of nauth0-lock before and including `11.30.0` are vulnerable to reflected XSS. An attacker can execute arbitrary code when the library's `flashMessage` feature is utilized and user input or data from URL parameters is incorporated into the `flashMessage` or the library's `languageDictionary` feature is utilized and user input or data from URL parameters is incorporated into the `languageDictionary`. The vulnerability is patched in version 11.30.1.
Vulnerability category: Cross site scripting (XSS)Execute code
Products affected by CVE-2021-32641
- cpe:2.3:a:auth0:lock:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-32641
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 39 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-32641
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST | |
6.1
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
NIST | |
8.1
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
GitHub, Inc. |
CWE ids for CVE-2021-32641
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: security-advisories@github.com (Primary)
References for CVE-2021-32641
-
https://github.com/auth0/lock/commit/d139cf01c8234b07caf265e051f39d3eab08f7ed
Merge pull request from GHSA-jr3j-whm4-9wwm · auth0/lock@d139cf0 · GitHubPatch;Third Party Advisory
-
https://github.com/auth0/lock/security/advisories/GHSA-jr3j-whm4-9wwm
Reflected XSS when using flashMessages or languageDictionary · Advisory · auth0/lock · GitHubExploit;Third Party Advisory
-
https://github.com/auth0/lock/releases/tag/v11.30.1
Release v11.30.1 · auth0/lock · GitHubRelease Notes;Third Party Advisory
Jump to