chore(deps): update dependency @clerk/nextjs to v6.23.3 [security]#161
Open
renovate[bot] wants to merge 1 commit intomainfrom
Open
chore(deps): update dependency @clerk/nextjs to v6.23.3 [security]#161renovate[bot] wants to merge 1 commit intomainfrom
renovate[bot] wants to merge 1 commit intomainfrom
Conversation
|
ce1fe4a to
dcdd2bc
Compare
dcdd2bc to
c177d77
Compare
c177d77 to
0f65653
Compare
0f65653 to
9930d0c
Compare
9930d0c to
009ec18
Compare
009ec18 to
56e4f1c
Compare
56e4f1c to
882b0b6
Compare
882b0b6 to
497bc27
Compare
497bc27 to
0efa976
Compare
0efa976 to
ccb0316
Compare
5f6c171 to
a54366a
Compare
a54366a to
6c4ca4e
Compare
4541f87 to
07d59d9
Compare
07d59d9 to
296ca2a
Compare
296ca2a to
5790c5d
Compare
|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.



This PR contains the following updates:
6.12.7→6.23.3GitHub Vulnerability Alerts
CVE-2025-53548
Impact
Applications that use the
verifyWebhook()helper to verify incoming Clerk webhooks are susceptible to accepting improperly signed webhook events.Patches
@clerk/backend: the helper has been patched as of2.4.0@clerk/astro: the helper has been patched as of2.10.2@clerk/express: the helper has been patched as of1.7.4@clerk/fastify: the helper has been patched as of2.4.4@clerk/nextjs: the helper has been patched as of6.23.3@clerk/nuxt: the helper has been patched as of1.7.5@clerk/react-router: the helper has been patched as of1.6.4@clerk/remix: the helper has been patched as of4.8.5@clerk/tanstack-react-start: the helper has been patched as of0.18.3Resolution
The issue was resolved in
@clerk/backend2.4.0by:Workarounds
If unable to upgrade, developers can workaround this issue by verifying webhooks manually, per this documentation.
Release Notes
clerk/javascript (@clerk/nextjs)
v6.23.3Compare Source
Patch Changes
c2f24da,abd8446,8387a39,feba23c,f2a6641,de9c01a,a8638b0,3b4b3cb]:v6.23.2Compare Source
Patch Changes
02a1f42,edc0bfd]:v6.23.1Compare Source
Patch Changes
f1be1fe,8bfdf94,bffb42a,084e7cc]:v6.23.0Compare Source
Minor Changes
Fix
auth.protect()unauthorized error propagation within middleware (#6169) by @wobsorianoOptimize
auth()calls to avoid unnecessary verification calls when the provided token type is not in theacceptsTokenarray. (#6123) by @wobsorianoAdd handling for invalid token types when
acceptsTokenis an array inauthenticateRequest(): now returns a clear unauthenticated state (tokenType: null) if the token is not in the accepted list.Patch Changes
b495279,c3fa15d,628583a,52d5e57,15a945c,10f3dda,72629b0,2692124]:v6.22.0Compare Source
Minor Changes
Add
<APIKeys />component. This component will initially be in early access and not recommended for production usage just yet. (#5858) by @wobsorianoRespect
acceptsTokenwhen returning unauthenticated session or machine object. (#6112) by @wobsorianoPatch Changes
Re-organize internal types for the recently added "machine authentication" feature. (#6067) by @wobsoriano
Resolve machine token property mixing in discriminated unions (#6079) by @wobsoriano
Updated dependencies [
19e9e11,18bcb64,2148166,4319257,607d333,138f733,4118ed7,18bcb64,d832d91,6842ff1,48be55b,183e382,2c6f805,97749d5]:v6.21.0Compare Source
Minor Changes
Introduces machine authentication, supporting four token types:
api_key,oauth_token,machine_token, andsession_token. For backwards compatibility,session_tokenremains the default when no token type is specified. This enables machine-to-machine authentication and use cases such as API keys and OAuth integrations. Existing applications continue to work without modification. (#5689) by @wobsorianoYou can specify which token types are allowed for a given route or handler using the
acceptsTokenproperty in theauth()helper, or thetokenproperty in theauth.protect()helper. Each can be set to a specific type, an array of types, or'any'to accept all supported tokens.Example usage in Nextjs middleware:
Leaf node route protection:
The
svixdependency is no longer needed when using theverifyWebhook()function.verifyWebhook()was refactored to not rely onsvixanymore while keeping the same functionality and behavior. (#6059) by @royangerIf you previously installed
svixto useverifyWebhook()you can uninstall it now:Patch Changes
Updated URL for 'auth() was called but Clerk can't detect usage of clerkMiddleware()' (#6035) by @royanger
Introduce
getAuthObjectFromJwtas internal utility function that centralizes the logic for generating auth objects from session JWTs. (#6053) by @LauraBeatrisUpdated dependencies [
ea622ba,d8fa5d9,be2e89c,c656270,5644d94,a3232c7,b578225,918e2e0,795d09a,4f93634,8838120]:v6.20.2Compare Source
Patch Changes
5421421,f897773,1c97fd0,2c6a0cc,71e6a1f]:v6.20.1Compare Source
Patch Changes
6ed3dfc,22c3363,ac6b231]:v6.20.0Compare Source
Minor Changes
Introduce
treatPendingAsSignedOutoption togetAuthandauthfromclerkMiddleware(#5756) by @LauraBeatrisBy default,
treatPendingAsSignedOutis set totrue, which means pending sessions are treated as signed-out. You can set this option tofalseto treat pending sessions as authenticated.Patch Changes
ced8912,f237d76,5f1375b]:v6.19.5Compare Source
Patch Changes
c305b31,b813cbe,6bb480e]:v6.19.4Compare Source
Patch Changes
b1337df,65f0878,df6fefd,4282bfa,5491491]:v6.19.3Compare Source
Patch Changes
1ff6d6e,fbf3cf4]:v6.19.2Compare Source
Patch Changes
0769a9b,0f5145e,afdfd18,b7c51ba,437b53b,5217155]:v6.19.1Compare Source
Patch Changes
4db96e0,36fb43f,e5ac444,4db96e0,d227805]:v6.19.0Compare Source
Minor Changes
Export a new
<PricingTable />component. This component renders plans for user or organizations and upon selection the end-user is prompted with a checkout form. (#5833) by @nikosdouvlisMark commerce apis as stable (#5833) by @nikosdouvlis
Patch Changes
Introduce
checkoutContinueUrloption. (#5807) by @alexcarpenterRename __experimental_checkoutContinueUrl to checkoutContinueUrl (#5826) by @nikosdouvlis
Replace __experimental_PricingTable with PricingTable (#5828) by @nikosdouvlis
Updated dependencies [
db0138f,45e8298,aa97231,c792f37,3bf08a9,74cf3b2,037b113,c15a412,7726a03,ed10566,b846a9a,e66c800,45e8298,9c41091,29462b4,322c43f,17397f9,45e8298]:v6.18.5Compare Source
Patch Changes
9ec0a73,d9222fc]:v6.18.4Compare Source
Patch Changes
225b9ca]:v6.18.3Compare Source
Patch Changes
be1c5d6,a122121]:v6.18.2Compare Source
Patch Changes
387bf62,2716622,294da82,4a8fe40]:v6.18.1Compare Source
Patch Changes
b02e766,5d78b28,d7f4438,5866855,0007106,462b5b2,447d7a9,2beea29,115601d]:v6.18.0Compare Source
Minor Changes
Adding reportTo and reportOnly configuration options to the contentSecurityPolicy config for clerkMiddleware (#5702) by @jacekradko
Export
<__experimental_PricingTable />. (#5691) by @panteliselefPatch Changes
Resolved an issue with Keyless on Safari where users appeared to be signed out immediately after a successful sign-in. (#5696) by @panteliselef
Updated dependencies [
ba19465,8b25035,f0f1ed7,25c3502]:v6.17.0Compare Source
Minor Changes
useClerk().statusalongside<ClerkFailed />and<ClerkDegraded />. (#5476) by @panteliselefuseClerk().statusPossible values for
useClerk().statusare:"loading": Set during initialization"error": Set when hotloading clerk-js failed orClerk.load()failed"ready": Set when Clerk is fully operational"degraded": Set when Clerk is partially operationalThe computed value of
useClerk().loadedis:truewhenuseClerk().statusis either"ready"or"degraded".falsewhenuseClerk().statusis"loading"or"error".<ClerkFailed /><ClerkDegraded />Patch Changes
4334598,33201bf,4334598,0ae0403]:v6.16.0Compare Source
Minor Changes
Patch Changes
Default
strictconfiguration option for CSP to false (#5652) by @jacekradkoUpdated dependencies [
45486ac,837692a,0c00e59,6a5f644]:v6.15.1Compare Source
Patch Changes
Add support for webhook verification with Next.js Pages Router. (#5618) by @wobsoriano
Updated dependencies [
ab939fd,03284da,7389ba3,00f16e4,bb35660,efb5d8c,c2712e7,aa93f7f,a7f3ebc,d3fa403,f6ef841,6cba4e2,fb6aa20,e634830,f8887b2]:v6.15.0Compare Source
Minor Changes
v6.14.3Compare Source
Patch Changes
Improve JSDoc comments (#5575) by @LekoArts
Updated dependencies [
70c9db9,554242e,cc1f9a0,8186cb5]:v6.14.2Compare Source
Patch Changes
3ad3bc8,3ad3bc8,cfa94b8,2033919,1b34bcb,5f3cc46]:v6.14.1Compare Source
Patch Changes
f6f275d]:v6.14.0Compare Source
Minor Changes
Update
useAuthto handle pending sessions as signed-out by default, with opt-out viauseAuth({ treatPendingAsSignedOut: false })or<ClerkProvider treatPendingAsSignedOut={false} />(#5507) by @LauraBeatrisauth().redirectToSignUp()that can be used in API routes and pages. Originally effort by @sambarnes (#5533) by @panteliselefAdded Content Security Policy (CSP) header generation functionality to
clerkMiddlewarewith support for both standard and strict-dynamic modes. Key features: (#5493) by @jacekradkoExample
Patch Changes
e1ec52b,bebb6d8,a8180ce,d0d5203,6112420,2cceeba,026ad57,9b25e31]:v6.13.0Compare Source
Minor Changes
Introduce a
verifyWebhook()function to verify incoming Clerk webhook requests and process the payload. This function handles webhook signature verification usingSvixand is now available across all backend and fullstack SDKs. (#5468) by @wobsorianoTo get started, install
svix, which Clerk uses to verify its webhooks:Then in your webhook route handler, import
verifyWebhook()from the Next.js SDK:For more information on how to sync Clerk data to your app with webhooks, see our guide.
Redirect to tasks on
auth.protectandauth.redirectToSignIn(#5440) by @LauraBeatrisPatch Changes
Fixing a Typing error in clerkMiddleware (#5470) by @jacekradko
Remove telemtry event from
clerkMiddleware(). (#5501) by @brkalowUpdated dependencies [
60a9a51,e984494,cd6ee92,ec4521b,38828ae,f30fa75,9c68678,fe065a9,619cde8]:v6.12.12Compare Source
Patch Changes
e20fb6b,77e6462]:v6.12.11Compare Source
Patch Changes
1da28a2,a9b618d,f20dc15,4d9f1ee]:v6.12.10Compare Source
Patch Changes
27d66a5,466ed13]:v6.12.9Compare Source
Patch Changes
The majority of Clerk applications are not impacted by the NextJS vulnerability disclosed on 22 MAR 2025. Your application might be impacted if you're not using the latest NextJS release and you do not call auth() in your routes or pages. We still recommend upgrading to the latest NextJS version as soon as possible. (#5426) by @nikosdouvlis
For more details, please see https://clerk.com/blog/cve-2025-29927
v6.12.8Compare Source
Patch Changes
892bc0e,892bc0e]:Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.