Critical severity9.1NVD Advisory· Published Apr 24, 2026· Updated Apr 29, 2026
CVE-2026-41248
CVE-2026-41248
Description
Clerk JavaScript is the official JavaScript repository for Clerk authentication. createRouteMatcher in @clerk/nextjs, @clerk/nuxt, and @clerk/astro can be bypassed by certain crafted requests, allowing them to skip middleware gating and reach downstream handlers. This vulnerability is fixed in @clerk/astro 1.5.7, 2.17.10, and 3.0.15; @clerk/nextjs 5.7.6, 6.39.2, and 7.2.1; @clerk/nuxt 1.13.28 and 2.2.2; and @clerk/shared 2.22.1, 3.47.4, anc 4.8.1
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@clerk/nextjsnpm | >= 5.0.0, < 5.7.6 | 5.7.6 |
@clerk/nuxtnpm | >= 1.1.0, < 1.13.28 | 1.13.28 |
@clerk/astronpm | >= 0.0.1, < 1.5.7 | 1.5.7 |
@clerk/sharednpm | >= 2.20.17, < 2.22.1 | 2.22.1 |
@clerk/nextjsnpm | >= 6.0.0-snapshot.vb87a27f, < 6.39.2 | 6.39.2 |
@clerk/nextjsnpm | >= 7.0.0, < 7.2.1 | 7.2.1 |
@clerk/nuxtnpm | >= 2.0.0, < 2.2.2 | 2.2.2 |
@clerk/astronpm | >= 2.0.0-snapshot.v20241206174604, < 2.17.10 | 2.17.10 |
@clerk/astronpm | >= 3.0.0, < 3.0.15 | 3.0.15 |
@clerk/sharednpm | >= 3.0.0-canary.v20250225091530, < 3.47.4 | 3.47.4 |
@clerk/sharednpm | >= 4.0.0, < 4.8.1 | 4.8.1 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
50- Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout SkimmingThe Hacker News · May 16, 2026
- Funnel Builder WordPress plugin bug exploited to steal credit cardsBleepingComputer · May 15, 2026
- Microsoft backpedals: Edge to stop loading passwords into memoryBleepingComputer · May 15, 2026
- Microsoft Warns of Exchange Server Zero-Day Exploited in the WildSecurityWeek · May 15, 2026
- Unpatched Microsoft Exchange Server vulnerability exploited (CVE-2026-42897)Help Net Security · May 15, 2026
- Microsoft warns of Exchange zero-day flaw exploited in attacksBleepingComputer · May 15, 2026
- Chrome 148 Update Patches Critical VulnerabilitiesSecurityWeek · May 15, 2026
- On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted EmailThe Hacker News · May 15, 2026
- 'FrostyNeighbor' APT Carefully Targets Govt Orgs in Poland, UkraineDark Reading · May 14, 2026
- Ghostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt StrikeThe Hacker News · May 14, 2026
- FrostyNeighbor: Fresh mischief and digital shenanigansESET WeLiveSecurity · May 14, 2026
- Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More PackagesThe Hacker News · May 12, 2026
- Worm Redux: Fresh Mini Shai-Hulud Infections Bite Supply ChainDark Reading · May 12, 2026
- TanStack, Mistral AI, UiPath Hit in Fresh Supply Chain AttackSecurityWeek · May 12, 2026
- Instructure reaches 'agreement' with ShinyHunters to stop data leakBleepingComputer · May 12, 2026
- cPanel CVE-2026-41940 Under Active Exploitation to Deploy Filemanager BackdoorThe Hacker News · May 11, 2026
- Instructure confirms hackers used Canvas flaw to deface portalsBleepingComputer · May 11, 2026
- Why we use CAPTCHAs, (Mon, May 11th)SANS Internet Storm Center · May 11, 2026
- ⚡ Weekly Recap: Linux Rootkit, macOS Crypto Stealer, WebSocket Skimmers and MoreThe Hacker News · May 11, 2026
- Cyber Espionage Group Targets Aviation Firms to Steal Map DataDark Reading · May 11, 2026
- Fake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K DownloadsThe Hacker News · May 11, 2026
- A week in security (May 4 – May 10)Malwarebytes Labs · May 11, 2026
- Week in review: cPanel vulnerability actively exploited, DigiCert breach, LinkedIn job scamsHelp Net Security · May 10, 2026
- Vulnerability in Claude Extension for Chrome Exposes AI Agent to TakeoverSecurityWeek · May 8, 2026
- vm2 Node.js Library Vulnerabilities Enable Sandbox Escape and Arbitrary Code ExecutionThe Hacker News · May 7, 2026
- Attackers adopt JavaScript runtime Bun to spread NWHStealerMalwarebytes Labs · May 6, 2026
- ⚡ Weekly Recap: AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE & MoreThe Hacker News · May 4, 2026
- Silver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and RussiaThe Hacker News · May 4, 2026
- A Ransomware Negotiator Was Working for a Ransomware GangSchneier on Security · May 1, 2026
- The never-ending supply chain attacks worm into SAP npm packages, other dev toolsThe Register Security · Apr 30, 2026
- The never-ending supply chain attacks worm into SAP npm packages, other dev toolsThe Register Security · Apr 30, 2026
- TeamPCP Hits SAP Packages With 'Mini Shai-Hulud' AttackDark Reading · Apr 30, 2026
- PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal CredentialsThe Hacker News · Apr 30, 2026
- EtherRAT Distribution Spoofing Administrative Tools via GitHub FacadesThe Hacker News · Apr 30, 2026
- SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain AttackThe Hacker News · Apr 29, 2026
- New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATsThe Hacker News · Apr 29, 2026
- Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer CampaignThe Hacker News · Apr 28, 2026
- Fake CAPTCHA scam turns a quick click into a costly phone billMalwarebytes Labs · Apr 28, 2026
- Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 MalwareThe Hacker News · Apr 27, 2026
- Fake CAPTCHA IRSF Scam and 120 Keitaro Campaigns Drive Global SMS, Crypto FraudThe Hacker News · Apr 27, 2026
- Crime crew impersonates help desk, abuses Microsoft Teams to steal your dataThe Register Security · Apr 25, 2026
- UNC6692 Impersonates IT Help Desk via Microsoft Teams to Deploy SNOW MalwareThe Hacker News · Apr 23, 2026
- Hypersonic Supply Chain Attacks: One Solution That Didn’t Need to Know the PayloadSentinelOne Labs · Apr 22, 2026
- Making Rust Workers reliable: panic and abort recovery in wasm‑bindgenCloudflare Blog · Apr 22, 2026
- IR Trends Q1 2026: Phishing reemerges as top initial access vector, as attacks targeting public administration persistCisco Talos Intelligence · Apr 22, 2026
- Shared Dictionaries: compression that keeps up with the agentic webCloudflare Blog · Apr 17, 2026
- The Good, the Bad and the Ugly in Cybersecurity – Week 16SentinelOne Labs · Apr 17, 2026
- Foxit, LibRaw vulnerabilitiesCisco Talos Intelligence · Apr 16, 2026
- The n8n n8mare: How threat actors are misusing AI workflow automationCisco Talos Intelligence · Apr 15, 2026
- The Good, the Bad and the Ugly in Cybersecurity – Week 14SentinelOne Labs · Apr 3, 2026