Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. better-auth
  4. ›
  5. GHSA-569q-mpph-wgww

GHSA-569q-mpph-wgww: Better Auth affected by external request basePath modification DoS

December 1, 2025

Affected versions of Better Auth allow an external request to configure baseURL when it isn’t defined through any other means. This can be abused to poison the router’s base path, causing all routes to return 404 for all users.

This issue is only exploitable when baseURL is not explicitly configured (e.g., BETTER_AUTH_URL is missing) and the attacker is able to make the very first request to the server after startup. In properly configured environments or typical managed hosting platforms, this fallback behavior cannot be reached.

References

  • github.com/advisories/GHSA-569q-mpph-wgww
  • github.com/better-auth/better-auth
  • github.com/better-auth/better-auth/releases/tag/v1.4.2
  • github.com/better-auth/better-auth/security/advisories/GHSA-569q-mpph-wgww
  • github.com/ray-project/ray/commit/70e7c72780bdec075dba6cad1afe0832772bfe09

Code Behaviors & Features

Detect and mitigate GHSA-569q-mpph-wgww with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.4.2

Fixed versions

  • 1.4.2

Solution

Upgrade to version 1.4.2 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Learn more about CVSS

Weakness

  • CWE-73: External Control of File Name or Path

Source file

npm/better-auth/GHSA-569q-mpph-wgww.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sun, 14 Dec 2025 00:19:40 +0000.