Cyber Posture

CVE-2026-34076

High

Published: 01 April 2026

Published
01 April 2026
Modified
03 April 2026
KEV Added
Patch
CVSS Score 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0003 7.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-34076 is a high-severity SSRF (CWE-918) vulnerability. Its CVSS base score is 7.4 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 7.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-4 (Information Flow Enforcement) and SC-7 (Boundary Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Validates user-supplied request paths in the clerkFrontendApiProxy function to block SSRF exploitation that sends the Clerk-Secret-Key to attacker-controlled servers.

prevent

Monitors and controls outbound communications at system boundaries to restrict the proxy from connecting to unauthorized external attacker servers.

prevent

Enforces information flow control policies to prevent the proxy function from initiating unauthorized requests carrying sensitive keys to external destinations.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1528 Steal Application Access Token Credential Access
Adversaries can steal application access tokens as a means of acquiring credentials to access remote systems and resources.
Why these techniques?

SSRF in public-facing Clerk proxy enables initial access via public app exploitation (T1190) and direct theft of application secret key as access token (T1528).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Clerk JavaScript is the official JavaScript repository for Clerk authentication. In @clerk/hono from versions 0.1.0 to before 0.1.5, @clerk/express from versions 2.0.0 to before 2.0.7, @clerk/backend from versions 3.0.0 to before 3.2.3, and @clerk/fastify from versions 3.1.0 to before 3.1.5,…

more

the clerkFrontendApiProxy function in @clerk/backend is vulnerable to Server-Side Request Forgery (SSRF). An unauthenticated attacker can craft a request path that causes the proxy to send the application's Clerk-Secret-Key to an attacker-controlled server. This issue has been patched in @clerk/hono version 0.1.5, @clerk/express version 2.0.7, @clerk/backend version 3.2.3, and @clerk/fastify version 3.1.5.

Deeper analysisAI

CVE-2026-34076 is a Server-Side Request Forgery (SSRF) vulnerability, mapped to CWE-918, in the clerkFrontendApiProxy function within the @clerk/backend package of Clerk JavaScript, the official JavaScript repository for Clerk authentication. It affects @clerk/hono versions from 0.1.0 up to but not including 0.1.5, @clerk/express versions from 2.0.0 up to but not including 2.0.7, @clerk/backend versions from 3.0.0 up to but not including 3.2.3, and @clerk/fastify versions from 3.1.0 up to but not including 3.1.5. The vulnerability carries a CVSS v3.1 base score of 7.4 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N) and was published on 2026-04-01.

An unauthenticated attacker can exploit this vulnerability by crafting a request path that manipulates the proxy function, causing it to send the application's sensitive Clerk-Secret-Key to a server under the attacker's control. This enables potential compromise of authentication secrets, which could lead to unauthorized access or further attacks on Clerk-integrated applications.

The vulnerability has been patched in @clerk/hono version 0.1.5, @clerk/express version 2.0.7, @clerk/backend version 3.2.3, and @clerk/fastify version 3.1.5. Additional details on the issue and remediation are available in the GitHub security advisory at https://github.com/clerk/javascript/security/advisories/GHSA-gjxx-92w9-8v8f.

Details

CWE(s)

CVEs Like This One

CVE-2026-33540Shared CWE-918
CVE-2026-7025Shared CWE-918
CVE-2025-21385Shared CWE-918
CVE-2025-52362Shared CWE-918
CVE-2026-31317Shared CWE-918
CVE-2026-5016Shared CWE-918
CVE-2026-26338Shared CWE-918
CVE-2025-58045Shared CWE-918
CVE-2025-68030Shared CWE-918
CVE-2025-27651Shared CWE-918

References