Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Flaw in API Keys Plugin Enables Account Takeovers

Critical Flaw in API Keys Plugin Enables Account Takeovers

Posted on February 19, 2026 By CWS

A severe vulnerability in the better-auth API keys plugin has been identified, enabling attackers to generate privileged API keys without authentication. This flaw, cataloged as CVE-2025-61928, affects all versions of the library before 1.3.26, which is widely used across various industries.

Discovery of the Vulnerability

The vulnerability was detected on October 1, 2025, during an analysis by ZeroPath’s automated SAST scanner. The scanner reviewed the canary branch of better-auth while developing third-party dependency workflows for large corporations. The plugin, known for its approximately 300,000 weekly downloads, is integral for authentication processes in many companies, including Equinor.

Details of the Exploitation

ZeroPath found that the issue lies in the createApiKey handler of the API keys plugin. It incorrectly determines the need for authentication by checking for a session or a userId field. If no session is present but a userId is included in the request, it bypasses the essential validation, leading to potential account takeovers.

An attacker can exploit this by sending a crafted POST request to /api/auth/api-key/create with the target’s user ID, obtaining a valid API key. The same vulnerability extends to the updateApiKey handler, enhancing the risk of credential alteration.

Mitigation and Response

Organizations using the affected plugin should upgrade to version 1.3.26 or later to fix the issue. It is crucial to rotate all API keys generated during the vulnerable period and invalidate any unused credentials. Monitoring of application logs for unauthorized access attempts is recommended.

The maintainers of better-auth responded swiftly to the disclosure, releasing a patch within a day. The security advisory GHSA-99h5-pjcv-gr6v was published soon after, demonstrating a collaborative effort to address the vulnerability promptly.

This incident underlines the importance of regular updates and vigilance in monitoring system vulnerabilities. Users are encouraged to follow cybersecurity updates to stay informed about potential threats.

Cyber Security News Tags:account takeover, API security, authentication bypass, better-auth, CVE-2025-61928, Cybersecurity, npm downloads, security advisory, software patch, Vulnerability, ZeroPath

Post navigation

Previous Post: OpenClaw Faces Ongoing Security Challenges with New Open Source Tool
Next Post: Venice Security Secures $33M for Access Management

Related Posts

CISA Warns of Samsung Mobile Devices 0-Day RCE Vulnerability Exploited in Attacks CISA Warns of Samsung Mobile Devices 0-Day RCE Vulnerability Exploited in Attacks Cyber Security News
PhantomRaven Attack Involves 126 Malicious npm Packages with Over 86,000 Downloads Hiding Malicious Code PhantomRaven Attack Involves 126 Malicious npm Packages with Over 86,000 Downloads Hiding Malicious Code Cyber Security News
Notepad++ v8.9.3 Enhances Security and Stability Notepad++ v8.9.3 Enhances Security and Stability Cyber Security News
PoC Exploit Released for Critical Outlook 0-Click Remote Code Execution Vulnerability PoC Exploit Released for Critical Outlook 0-Click Remote Code Execution Vulnerability Cyber Security News
Grafana Vulnerabilities Allow User Redirection to Malicious Sites and Code Execution in Dashboards Grafana Vulnerabilities Allow User Redirection to Malicious Sites and Code Execution in Dashboards Cyber Security News
Browser Extension Misuse Reveals Security Risks Browser Extension Misuse Reveals Security Risks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fortinet Addresses Critical FortiClient EMS Vulnerability
  • 36 Malicious npm Packages Exploit Databases for Persistent Access
  • Node.js Developers Face Advanced Social Engineering Threat
  • Hackers Exploit Code Leak to Spread Malware via GitHub
  • Fortinet Issues Patch for Critical FortiClient EMS Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fortinet Addresses Critical FortiClient EMS Vulnerability
  • 36 Malicious npm Packages Exploit Databases for Persistent Access
  • Node.js Developers Face Advanced Social Engineering Threat
  • Hackers Exploit Code Leak to Spread Malware via GitHub
  • Fortinet Issues Patch for Critical FortiClient EMS Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark