High severity7.4NVD Advisory· Published Mar 20, 2026· Updated Apr 14, 2026
CVE-2026-32887
CVE-2026-32887
Description
Effect is a TypeScript framework that consists of several packages that work together to help build TypeScript applications. Prior to version 3.20.0, when using RpcServer.toWebHandler (or HttpApp.toWebHandlerRuntime) inside a Next.js App Router route handler, any Node.js AsyncLocalStorage-dependent API called from within an Effect fiber can read another concurrent request's context — or no context at all. Under production traffic, auth() from @clerk/nextjs/server returns a different user's session. Version 3.20.0 contains a fix for the issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
effectnpm | < 3.20.0 | 3.20.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/Effect-TS/effect/security/advisories/GHSA-38f7-945m-qr2gnvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-38f7-945m-qr2gghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-32887ghsaADVISORY
News mentions
50- Instructure Pays ShinyHunters Ransom to Little Likely ReturnGovInfoSecurity · May 17, 2026
- Friday Squid Blogging: Bigfin SquidSchneier on Security · May 16, 2026
- Here’s how the FTC plans to enforce the Take It Down ActCyberScoop · May 15, 2026
- Akamai to acquire LayerX for $205 millionHelp Net Security · May 15, 2026
- MPs want social media treated more like unsafe toys than harmless appsThe Register Security · May 15, 2026
- AI Drives Cybersecurity Investments, Widening 'Valley of Death'Dark Reading · May 14, 2026
- New Fragnesia Flaw Hands Linux Local Users Root AccessInfosecurity Magazine · May 14, 2026
- Dirty Frag gets a sequel as Fragnesia hands Linux attackers root-level accessThe Register Security · May 14, 2026
- When IT Support Calls: Dissecting a ModeloRAT Campaign from Teams to Domain CompromiseRapid7 Blog · May 13, 2026
- Most Remediation Programs Never Confirm the Fix Actually WorkedThe Hacker News · May 13, 2026
- Congressman launches inquiry into how food retailers use surveillance pricingThe Record · May 12, 2026
- 20 Leaders Who Built the CISO Era: 2 Decades of ChangeDark Reading · May 12, 2026
- OpenAI Launches Daybreak for AI-Powered Vulnerability Detection and Patch ValidationThe Hacker News · May 12, 2026
- Build Application Firewalls Aim to Stop the Next Supply Chain AttackSecurityWeek · May 11, 2026
- LLMs and Text-in-Text SteganographySchneier on Security · May 11, 2026
- Week in review: cPanel vulnerability actively exploited, DigiCert breach, LinkedIn job scamsHelp Net Security · May 10, 2026
- Friday Squid Blogging: Giant Squid Live in the Waters of Western AustraliaSchneier on Security · May 8, 2026
- Dirty Frag: Unpatched Linux vulnerability delivers root accessHelp Net Security · May 8, 2026
- Meta U-turns on encryption push for Instagram as DMs go plaintextThe Register Security · May 8, 2026
- Cyberattack Hits Canvas System Used by Thousands of Schools as Finals LoomSecurityWeek · May 8, 2026
- If a fake moustache can fool age checks, is the Online Safety Act working?Malwarebytes Labs · May 7, 2026
- Google Chrome’s silent 4GB AI download problem [updated]Malwarebytes Labs · May 6, 2026
- From Stuxnet to ChatGPT: 20 News Events That Shaped CyberDark Reading · May 6, 2026
- Middle East Cyber Battle Field Broadens — Especially in UAEDark Reading · May 6, 2026
- Research Hub Bridges Cybersecurity Gap for Under-Resourced OrganizationsDark Reading · May 5, 2026
- One in four MCP servers opens AI agent security to code execution riskHelp Net Security · May 5, 2026
- TeamPCP Weekly Analysis: 2026-W18 (2026-04-27 through 2026-05-03), (Mon, May 4th)SANS Internet Storm Center · May 4, 2026
- Anthropic's Mythos Has Landed: Here's What Comes Next for CyberDark Reading · Apr 30, 2026
- Anti-DDoS Firm Heaped Attacks on Brazilian ISPsKrebs on Security · Apr 30, 2026
- Webinar: How to Automate Exposure Validation to Match the Speed of AI AttacksThe Hacker News · Apr 29, 2026
- Critical Flaw Turns Vect Ransomware into Data Destroying WiperInfosecurity Magazine · Apr 29, 2026
- Fresh Wave of GlassWorm VS Code Extensions Slices Through Supply ChainDark Reading · Apr 28, 2026
- VECT: Ransomware by design, Wiper by accidentCheck Point Research · Apr 28, 2026
- Ongoing supply-chain attack 'explicitly targeting' security, dev toolsThe Register Security · Apr 27, 2026
- Ongoing supply-chain attack 'explicitly targeting' security, dev toolsThe Register Security · Apr 27, 2026
- Could your choice of metrics be harming your SOC?NCSC UK · Apr 27, 2026
- Medieval Encrypted Letter DecodedSchneier on Security · Apr 27, 2026
- CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal DeadlineThe Hacker News · Apr 25, 2026
- ICE Uses Graphite SpywareSchneier on Security · Apr 22, 2026
- Surge in Bomgar RMM Exploitation Demonstrates Supply Chain RiskDark Reading · Apr 21, 2026
- DFIR Report – The Gentlemen & SystemBC: A Sneak Peek Behind the ProxyCheck Point Research · Apr 20, 2026
- What the ransom note won’t sayESET WeLiveSecurity · Apr 20, 2026
- Redirects for AI Training enforces canonical contentCloudflare Blog · Apr 17, 2026
- Systemic Flaw in MCP Protocol Could Expose 150 Million DownloadsInfosecurity Magazine · Apr 16, 2026
- Automotive Ransomware Attacks Double in a YearInfosecurity Magazine · Apr 16, 2026
- A Clearer Path from Prioritized Exposures to Remediation ProgressRapid7 Blog · Apr 15, 2026
- Edge Decay: How a Failing Perimeter Is Fueling Modern IntrusionsSentinelOne Labs · Apr 9, 2026
- As breakout time accelerates, prevention-first cybersecurity takes center stageESET WeLiveSecurity · Apr 7, 2026
- ZDI-26-251: Foxit PDF Reader Update Service Uncontrolled Search Path Element Local Privilege Escalation VulnerabilityZero Day Initiative · Apr 2, 2026
- TeamPCP Explores Ways to Exploit Stolen Supply Chain SecretsInfosecurity Magazine · Mar 31, 2026