Intel

AIKIDO-2026-10052

@cedarjs/auth-dbauth-setup is vulnerable to Predictable Exact Value from Previous Values

Predictable Exact Value from Previous Values Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

51

Medium Risk

This Affects:

JS@cedarjs/auth-dbauth-setup
0.1.0 - 2.3.1
Fixed in 2.4.0

TL;DR

Affected versions of this package are vulnerable to a Predictable User ID Sequence vulnerability due to the use of sequential integers for user IDs, which makes it easy to guess valid IDs and estimate system user count. An attacker can exploit this by brute-forcing or iterating through possible IDs to enumerate user accounts, potentially leading to unauthorized access or data exposure. While UUIDs are now the default for dbAuth to mitigate this, developers can still switch to auto-incrementing integers, maintaining the risk if not properly configured.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

@cedarjs/auth-dbauth-setup is vulnerable to Predictable Exact Value from Previous Values in versions 0.1.0 - 2.3.1.

How to fix this

Upgrade the @cedarjs/auth-dbauth-setup library to a patch version.