Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-42349
PUBLISHED
More InfoOfficial Page
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
View Known Exploited Vulnerability (KEV) details
Published At-11 May, 2026 | 16:08
Updated At-11 May, 2026 | 16:08
Rejected At-
▼CVE Numbering Authority (CNA)
Clerk: Authorization bypass when combining organization, billing, or reverification checks

Clerk JavaScript is the official JavaScript repository for Clerk authentication. has(), auth.protect(), and related authorization predicates in @clerk/shared, @clerk/nextjs, @clerk/backend, and other framework SDKs can return true for certain combined authorization checks when the result should be false, allowing a gated action to proceed for a user who does not satisfy the full set of requested conditions. This call shape can be bypassed if certain conditions are met: a has() or auth.protect() call that combines a reverification check with any of role, permission, feature, or plan, or that combines a billing check (feature or plan) with a role or permission check. This vulnerability is fixed in @clerk/clerk-js 5.125.10 and 6.7.5.

Affected Products
Vendor
clerk
Product
javascript
Versions
Affected
  • >= 5.22.0, < 5.125.10
  • >= 6.0.0, < 6.7.5
Vendor
@clerk
Product
shared
Versions
Affected
  • >= 3.0.0, <= 3.47.4
  • >= 4.0.0, <= 4.8.2
Vendor
@clerk
Product
backend
Versions
Affected
  • >= 2.0.0, <= 2.33.2
  • >= 3.0.0, <= 3.2.13
Vendor
@clerk
Product
nextjs
Versions
Affected
  • >= 6.0.0, <= 6.39.2
  • >= 7.0.0, <= 7.2.3
Vendor
@clerk
Product
clerk-react
Versions
Affected
  • >= 5.9.0, <= 5.61.5
Vendor
@clerk
Product
react
Versions
Affected
  • >= 6.0.0, <= 6.4.2
Vendor
@clerk
Product
vue
Versions
Affected
  • >= 1.0.0, <= 1.17.20
  • >= 2.0.0, <= 2.0.15
Vendor
@clerk
Product
astro
Versions
Affected
  • >= 2.0.0, <= 2.17.10
  • >= 3.0.0, <= 3.0.17
Vendor
@clerk
Product
nuxt
Versions
Affected
  • >= 1.0.0, <= 1.13.28
  • >= 2.0.0, <= 2.2.4
Vendor
@clerk
Product
clerk-expo
Versions
Affected
  • >= 2.2.11, <= 2.19.35
Vendor
@clerk
Product
expo
Versions
Affected
  • >= 3.0.0, <= 3.2.1
Vendor
@clerk
Product
react-router
Versions
Affected
  • >= 0.0.1, <= 2.4.12
  • >= 3.0.0, <= 3.1.3
Vendor
@clerk
Product
tanstack-react-start
Versions
Affected
  • >= 0.0.1, <= 0.29.10
  • >= 1.0.0, <= 1.1.3
Vendor
@clerk
Product
chrome-extension
Versions
Affected
  • >= 1.3.5, <= 2.9.14
  • >= 3.0.0, <= 3.1.14
Vendor
@clerk
Product
fastify
Versions
Affected
  • >= 1.0.42, <= 2.6.30
  • >= 3.0.0, <= 3.1.15
Vendor
@clerk
Product
express
Versions
Affected
  • >= 0.1.0, <= 1.7.78
  • >= 2.0.0, <= 2.1.5
Vendor
@clerk
Product
hono
Versions
Affected
  • >= 0.0.2, <= 0.1.15
Problem Types
TypeCWE IDDescription
CWECWE-754CWE-754: Improper Check for Unusual or Exceptional Conditions
CWECWE-863CWE-863: Incorrect Authorization
Type: CWE
CWE ID: CWE-754
Description: CWE-754: Improper Check for Unusual or Exceptional Conditions
Type: CWE
CWE ID: CWE-863
Description: CWE-863: Incorrect Authorization
Metrics
VersionBase scoreBase severityVector
4.07.6HIGH
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
Version: 4.0
Base score: 7.6
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/clerk/javascript/security/advisories/GHSA-w24r-5266-9c3c
x_refsource_CONFIRM
Hyperlink: https://github.com/clerk/javascript/security/advisories/GHSA-w24r-5266-9c3c
Resource:
x_refsource_CONFIRM
Details not found