Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Better Auth API keys Vulnerability Let Attackers Create Privileged Credentials For Arbitrary Users

Better Auth API keys Vulnerability Let Attackers Create Privileged Credentials For Arbitrary Users

Posted on October 21, 2025October 22, 2025 By CWS

A extreme vulnerability within the widespread better-auth library’s API keys plugin allows attackers to generate privileged credentials for any person with out authentication.

Dubbed CVE-2025-61928, the difficulty impacts better-auth, a TypeScript authentication framework downloaded round 300,000 occasions weekly on npm.

This flaw may result in widespread account compromises, significantly for purposes counting on API keys for automated entry. Higher-auth powers authentication for fast-growing startups and main enterprises, together with power large Equinor.

Its plugin structure simplifies including options like API key administration, however a refined bug within the authorization logic opened the door to exploitation.

ZeroPath uncovered the vulnerability throughout scans of third-party dependencies, highlighting dangers in authentication libraries that underpin total utility ecosystems.

Higher Auth API Keys Vulnerability

The issue lies within the createApiKey handler throughout the plugin. Usually, it derives person context from an energetic session to implement safety checks.

Nonetheless, when a request lacks a session however features a userId within the physique, the code units an “authRequired” flag to false. This skips essential validations, permitting the handler to manufacture a person object from attacker-supplied knowledge.

In consequence, unauthenticated attackers can POST to the /api/auth/api-key/create endpoint with a goal person’s ID, identify, and elective privileged fields like charge limits or permissions.

The response returns a sound API key tied to the sufferer’s account, bypassing multi-factor authentication and enabling scripted takeovers. The identical logic impacts replace endpoints, amplifying the chance.

API keys typically grant long-lived, elevated privileges for automation, making this vulnerability significantly harmful. Attackers may impersonate customers, entry delicate knowledge, or automate malicious actions throughout providers.

Solely deployments with the API keys plugin are impacted, however given better-auth’s adoption, publicity is important. To mitigate, improve instantly to better-auth model 1.3.26 or later, which fixes the authorization examine.

Rotate all API keys created through the plugin, invalidate unused ones, and audit logs for suspicious unauthenticated requests to create or replace endpoints, particularly these setting userId or high-privilege values.

The maintainers patched it swiftly after disclosure on October 2. The advisory (GHSA-99h5-pjcv-gr6v) was revealed on October 8 through GitHub, and the CVE was assigned the following day.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:API, Arbitrary, Attackers, Auth, Create, Credentials, Keys, Privileged, Users, Vulnerability

Post navigation

Previous Post: Microsoft 365 Copilot Prompt Injection Vulnerability Allows Attackers to Exfiltrate Sensitive Data
Next Post: Apache Syncope Groovy RCE Vulnerability Let Attackers Inject Malicious Code

Related Posts

Attackers Abuse Discord to Deliver Clipboard Hijacker That Steals Wallet Addresses on Paste Attackers Abuse Discord to Deliver Clipboard Hijacker That Steals Wallet Addresses on Paste Cyber Security News
Fired Intel Engineer Stolen 18,000 Files Many of which Were Classified as “Top Secret” Fired Intel Engineer Stolen 18,000 Files Many of which Were Classified as “Top Secret” Cyber Security News
CISA Adds Critical React2Shell Vulnerability to KEV Catalog Following Active Exploitation CISA Adds Critical React2Shell Vulnerability to KEV Catalog Following Active Exploitation Cyber Security News
Ukraine Police Exposed Russian Hacker Group Specializes in Ransomware Attack Ukraine Police Exposed Russian Hacker Group Specializes in Ransomware Attack Cyber Security News
Fortinet FortiSIEM Command Injection Vulnerability (CVE-2025-25256) Fortinet FortiSIEM Command Injection Vulnerability (CVE-2025-25256) Cyber Security News
Critical Dolby Codec Vulnerability Exposes Android Devices to Code Execution Attacks Critical Dolby Codec Vulnerability Exposes Android Devices to Code Execution Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News