CVE-2026-41248

Received
Published: 24 Apr 2026, 21:04
Last modified:24 Apr 2026, 21:04

Vulnerability Summary

Overall Risk (default)
high
70/100
CVSS Score
9.1 CRITICAL
v3.1 (cve.org)
EPSS Score
No data
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected

Timeline

24 Apr 2026, 21:04
Published
Vulnerability first disclosed

Description

Clerk JavaScript is the official JavaScript repository for Clerk authentication. createRouteMatcher in @clerk/nextjs, @clerk/nuxt, and @clerk/astro can be bypassed by certain crafted requests, allowing them to skip middleware gating and reach downstream handlers. This vulnerability is fixed in @clerk/astro 1.5.7, 2.17.10, and 3.0.15; @clerk/nextjs 5.7.6, 6.39.2, and 7.2.1; @clerk/nuxt 1.13.28 and 2.2.2; and @clerk/shared 2.22.1, 3.47.4, anc 4.8.1

CVSS Metrics

  • v3.1CRITICALScore: 9.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Techniques & Countermeasures

  • CWE-436Interpretation Conflict

    Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state.

  • CWE-863Incorrect Authorization

    The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.

Affected Systems

  • clerkastro

    ≥ 0.0.1, < 1.5.7 | ≥ 2.0.0-snapshot.v20241206174604, ≤ 2.17.9 | ≥ 3.0.0, < 3.0.15

  • clerknextjs

    ≥ 5.0.0, < 5.7.6 | ≥ 6.0.0-snapshot.vb87a27f, < 6.39.2 | ≥ 7.0.0, < 7.2.1

  • clerknuxt

    ≥ 1.1.0, < 1.13.28 | ≥ 2.0.0, < 2.2.2

  • clerkshared

    ≥ 2.20.17, < 2.22.1 | ≥ 3.0.0-canary.v20250225091530, < 3.47.4 | ≥ 4.0.0, < 4.8.1

References (1)