@better-auth/stripe is vulnerable to Prototype Pollution
73
High Risk
The Stripe plugin merges developer and user-supplied Stripe metadata objects to attach internal identifiers on customers and subscriptions. When that merge used deep-merge semantics, attacker-controlled objects could supply special keys such as __proto__ that influence the merged object’s prototype chain. The change replaces the unsafe merge for flat metadata with an explicit loop that copies only string keys and skips reserved prototype-related keys, then applies internal fields last so trusted values win.
You are affected if you are using a version that falls within the vulnerable range.
@better-auth/stripe is vulnerable to Prototype Pollution in versions 1.5.0 - 1.6.2.
Upgrade the @better-auth/stripe library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant