CVE-2026-42349
Clerk: Authorization bypass when combining organization, billing, or reverification checks
Clerk JavaScript is the official JavaScript repository for Clerk authentication. has(), auth.protect(), and related authorization predicates in @clerk/shared, @clerk/nextjs, @clerk/backend, and other framework SDKs can return true for certain combined authorization checks when the result should be false, allowing a gated action to proceed for a user who does not satisfy the full set of requested conditions. This call shape can be bypassed if certain conditions are met: a has() or auth.protect() call that combines a reverification check with any of role, permission, feature, or plan, or that combines a billing check (feature or plan) with a role or permission check. This vulnerability is fixed in @clerk/clerk-js 5.125.10 and 6.7.5.
| CWE | CWE-754 CWE-863 |
| Vendor | clerk |
| Product | javascript |
| Published | May 11, 2026 |
Get instant alerts for clerk javascript
Be the first to know when new unknown vulnerabilities affecting clerk javascript are published โ delivered to Slack, Telegram or Discord.