Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Flaw in API Keys Plugin Enables Account Takeovers

Critical Flaw in API Keys Plugin Enables Account Takeovers

Posted on February 19, 2026 By CWS

A severe vulnerability in the better-auth API keys plugin has been identified, enabling attackers to generate privileged API keys without authentication. This flaw, cataloged as CVE-2025-61928, affects all versions of the library before 1.3.26, which is widely used across various industries.

Discovery of the Vulnerability

The vulnerability was detected on October 1, 2025, during an analysis by ZeroPath’s automated SAST scanner. The scanner reviewed the canary branch of better-auth while developing third-party dependency workflows for large corporations. The plugin, known for its approximately 300,000 weekly downloads, is integral for authentication processes in many companies, including Equinor.

Details of the Exploitation

ZeroPath found that the issue lies in the createApiKey handler of the API keys plugin. It incorrectly determines the need for authentication by checking for a session or a userId field. If no session is present but a userId is included in the request, it bypasses the essential validation, leading to potential account takeovers.

An attacker can exploit this by sending a crafted POST request to /api/auth/api-key/create with the target’s user ID, obtaining a valid API key. The same vulnerability extends to the updateApiKey handler, enhancing the risk of credential alteration.

Mitigation and Response

Organizations using the affected plugin should upgrade to version 1.3.26 or later to fix the issue. It is crucial to rotate all API keys generated during the vulnerable period and invalidate any unused credentials. Monitoring of application logs for unauthorized access attempts is recommended.

The maintainers of better-auth responded swiftly to the disclosure, releasing a patch within a day. The security advisory GHSA-99h5-pjcv-gr6v was published soon after, demonstrating a collaborative effort to address the vulnerability promptly.

This incident underlines the importance of regular updates and vigilance in monitoring system vulnerabilities. Users are encouraged to follow cybersecurity updates to stay informed about potential threats.

Cyber Security News Tags:account takeover, API security, authentication bypass, better-auth, CVE-2025-61928, Cybersecurity, npm downloads, security advisory, software patch, Vulnerability, ZeroPath

Post navigation

Previous Post: OpenClaw Faces Ongoing Security Challenges with New Open Source Tool
Next Post: Venice Security Secures $33M for Access Management

Related Posts

Cisco Hacked – Attackers Stolen Profile Details of users Registered on Cisco.com Cisco Hacked – Attackers Stolen Profile Details of users Registered on Cisco.com Cyber Security News
New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently Cyber Security News
New SmartAttack Steals Sensitive Data From Air-Gapped Systems via Smartwatches New SmartAttack Steals Sensitive Data From Air-Gapped Systems via Smartwatches Cyber Security News
Cisco Secure Firewall Vulnerability Allows Hackers to Inject Remote Shell Command Injection Cisco Secure Firewall Vulnerability Allows Hackers to Inject Remote Shell Command Injection Cyber Security News
Critical GoAnywhere MFT Platform Vulnerability Exposes Enterprises to Remote Exploitation Critical GoAnywhere MFT Platform Vulnerability Exposes Enterprises to Remote Exploitation Cyber Security News
New ‘Penguin’ Pig Butchering as a Service Selling PII, Stolen Accounts and Fraud Kits New ‘Penguin’ Pig Butchering as a Service Selling PII, Stolen Accounts and Fraud Kits Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenSSL Vulnerabilities and Emerging Cyber Threats
  • Hackers Use Emoji Code to Evade Security Systems
  • Ivanti Vulnerabilities Exploited in Recent Cyber Attacks
  • XWorm Malware Targets Latin American Businesses
  • Figure Tech Data Breach Exposes 1 Million User Records

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenSSL Vulnerabilities and Emerging Cyber Threats
  • Hackers Use Emoji Code to Evade Security Systems
  • Ivanti Vulnerabilities Exploited in Recent Cyber Attacks
  • XWorm Malware Targets Latin American Businesses
  • Figure Tech Data Breach Exposes 1 Million User Records

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News