Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Flaw in API Keys Plugin Enables Account Takeovers

Critical Flaw in API Keys Plugin Enables Account Takeovers

Posted on February 19, 2026 By CWS

A severe vulnerability in the better-auth API keys plugin has been identified, enabling attackers to generate privileged API keys without authentication. This flaw, cataloged as CVE-2025-61928, affects all versions of the library before 1.3.26, which is widely used across various industries.

Discovery of the Vulnerability

The vulnerability was detected on October 1, 2025, during an analysis by ZeroPath’s automated SAST scanner. The scanner reviewed the canary branch of better-auth while developing third-party dependency workflows for large corporations. The plugin, known for its approximately 300,000 weekly downloads, is integral for authentication processes in many companies, including Equinor.

Details of the Exploitation

ZeroPath found that the issue lies in the createApiKey handler of the API keys plugin. It incorrectly determines the need for authentication by checking for a session or a userId field. If no session is present but a userId is included in the request, it bypasses the essential validation, leading to potential account takeovers.

An attacker can exploit this by sending a crafted POST request to /api/auth/api-key/create with the target’s user ID, obtaining a valid API key. The same vulnerability extends to the updateApiKey handler, enhancing the risk of credential alteration.

Mitigation and Response

Organizations using the affected plugin should upgrade to version 1.3.26 or later to fix the issue. It is crucial to rotate all API keys generated during the vulnerable period and invalidate any unused credentials. Monitoring of application logs for unauthorized access attempts is recommended.

The maintainers of better-auth responded swiftly to the disclosure, releasing a patch within a day. The security advisory GHSA-99h5-pjcv-gr6v was published soon after, demonstrating a collaborative effort to address the vulnerability promptly.

This incident underlines the importance of regular updates and vigilance in monitoring system vulnerabilities. Users are encouraged to follow cybersecurity updates to stay informed about potential threats.

Cyber Security News Tags:account takeover, API security, authentication bypass, better-auth, CVE-2025-61928, Cybersecurity, npm downloads, security advisory, software patch, Vulnerability, ZeroPath

Post navigation

Previous Post: OpenClaw Faces Ongoing Security Challenges with New Open Source Tool
Next Post: Venice Security Secures $33M for Access Management

Related Posts

Ransomware Targeting Hyper-V and VMware ESXi Surges as Akira Group Exploits System Vulnerabilities Ransomware Targeting Hyper-V and VMware ESXi Surges as Akira Group Exploits System Vulnerabilities Cyber Security News
How To Get Real-Time IOCs From Incidents Across 15K SOCs  How To Get Real-Time IOCs From Incidents Across 15K SOCs  Cyber Security News
Microsoft Confirms Teams Outage for Users, Investigation Underway Microsoft Confirms Teams Outage for Users, Investigation Underway Cyber Security News
Supply Chain Security Mitigating Third-Party Risks Supply Chain Security Mitigating Third-Party Risks Cyber Security News
Heathrow and Other European Airports Hit by Cyberattack, Several Flights Delayed Heathrow and Other European Airports Hit by Cyberattack, Several Flights Delayed Cyber Security News
Critical AVEVA Software Vulnerabilities Enables Remote Code Execution Under System Privileges Critical AVEVA Software Vulnerabilities Enables Remote Code Execution Under System Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Authorities Shut Down Criminal VPN in Global Cybercrime Crackdown
  • Google Urges Chrome Update to Block Critical Threats
  • Critical Drupal Security Flaw Threatens Global Websites
  • AI Fuels Surge in Google’s Chrome Vulnerability Discoveries
  • Critical Flaw in Cisco Secure Workload Exposes APIs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Authorities Shut Down Criminal VPN in Global Cybercrime Crackdown
  • Google Urges Chrome Update to Block Critical Threats
  • Critical Drupal Security Flaw Threatens Global Websites
  • AI Fuels Surge in Google’s Chrome Vulnerability Discoveries
  • Critical Flaw in Cisco Secure Workload Exposes APIs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark