Intel

AIKIDO-2026-10481

@better-auth/oauth-provider is vulnerable to Improper Input Validation

Improper Input Validation Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

55

Medium Risk

This Affects:

JS@better-auth/oauth-provider
1.6.0 - 1.6.2
Fixed in 1.6.3

TL;DR

Authorization code verification payloads were not consistently validated when deserialized. Malformed or corrupted verification values could lead to inconsistent error handling compared with the intended OAuth error codes. The change validates stored verification material with a schema so invalid inputs fail with a deterministic invalid_verification outcome instead of falling through to unsafe or unclear server behavior.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

@better-auth/oauth-provider is vulnerable to Improper Input Validation in versions 1.6.0 - 1.6.2.

How to fix this

Upgrade the @better-auth/oauth-provider library to the patch version.