9.3
.
This vulnerability allows an attacker to bypass the CSRF check from the state parameter if it’s missing from the authorization response, leaving the client vulnerable to CSRF attacks.
Patching this vulnerability requires a library upgrade.
9.3
then you are affected by this vulnerability.
9.3
or higher.
Updated packages are available on npm. To ensure delivery of additional bug fixes moving forward, please make sure your package.json
file is updated to take patch and minor level updates of our libraries.