The Auth0 authentication service before 2017-10-15 allows privilege escalation because the JWT audience is not validated.
CSRF exists in the Auth0 authentication service through 14591 if the Legacy Lock API flag is enabled.
In auth0 (npm package) versions before 2.27.1, a DenyList of specific keys that should be sanitized from the request object contained in the error object is used. The key for Authorization header is not sanitized and in certain cases the Authorization header value can be logged exposing a bearer token. You are affected by this vulnerability if you are using the auth0 npm package, and you are using a Machine to Machine application authorized to use Auth0's management API
Stay updated with the latest patches and releases. Plan your sofware desisgn. Avoid common known vulnerabilities fixed by the open source community
Latest patch release: 2.0.18
Latest minor release: 2.3.0
Latest major release: 9.20.1
Maintain your licence declarations and avoid unwanted licences to protect your IP the way you intended.
MIT - MIT License