Intel

AIKIDO-2026-10500

@better-auth/stripe is vulnerable to Prototype Pollution

Prototype Pollution Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

73

High Risk

This Affects:

JS@better-auth/stripe
1.5.0 - 1.6.2
Fixed in 1.6.3
Are you affected? Scan for Free

TL;DR

The Stripe plugin merges developer and user-supplied Stripe metadata objects to attach internal identifiers on customers and subscriptions. When that merge used deep-merge semantics, attacker-controlled objects could supply special keys such as __proto__ that influence the merged object’s prototype chain. The change replaces the unsafe merge for flat metadata with an explicit loop that copies only string keys and skips reserved prototype-related keys, then applies internal fields last so trusted values win.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

@better-auth/stripe is vulnerable to Prototype Pollution in versions 1.5.0 - 1.6.2.

How to fix this

Upgrade the @better-auth/stripe library to the patch version.