@better-auth/oauth-provider is vulnerable to Improper Input Validation
55
Medium Risk
Authorization code verification payloads were not consistently validated when deserialized. Malformed or corrupted verification values could lead to inconsistent error handling compared with the intended OAuth error codes. The change validates stored verification material with a schema so invalid inputs fail with a deterministic invalid_verification outcome instead of falling through to unsafe or unclear server behavior.
You are affected if you are using a version that falls within the vulnerable range.
@better-auth/oauth-provider is vulnerable to Improper Input Validation in versions 1.6.0 - 1.6.2.
Upgrade the @better-auth/oauth-provider library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant