CVE-2026-34076
March 28, 2026
Summary The "clerkFrontendApiProxy" function in "@clerk/backend" is vulnerable to Server-Side Request Forgery (SSRF). An unauthenticated attacker can craft a request path that causes the proxy to send the application's "Clerk-Secret-Key" to an attacker-controlled server. Affected packages Only applications that have opted into the "frontendApiProxy" feature are affected. This feature is not enabled by default. Users of "@clerk/nextjs" are not affected due to how the framework handles repeated "/" in request paths. | Package | Affected versions | Fixed version | |---|---|---| | "@clerk/backend" | ">= 3.0.0, <= 3.2.2" | "3.2.3" | | "@clerk/express" | ">= 2.0.0, <= 2.0.6" | "2.0.7" | | "@clerk/hono" | ">= 0.1.0, <= 0.1.4" | "0.1.5" | | "@clerk/fastify" | ">= 3.1.0, <= 3.1.4" | "3.1.5" | Search your codebase for the "frontendApiProxy" option. If none of the patterns below appear in your code, you are not affected. @clerk/express app.use(clerkMiddleware({ frontendApiProxy: { enabled: true } })); @clerk/hono app.use('*', clerkMiddleware({ frontendApiProxy: { enabled: true } })); @clerk/fastify fastify.register(clerkPlugin, { frontendApiProxy: { enabled: true } }); @clerk/backend import { clerkFrontendApiProxy } from '@clerk/backend/proxy'; A quick way to check across your entire project: grep -r "frontendApiProxy|clerkFrontendApiProxy" . If there are no matches, you are not using this feature. Recommended actions Clerk's internal logs show no evidence of users utilizing the built-in proxy with the impacted versions. Despite that, if you are on an impacted version and use the built-in proxy we recommend upgrading and rotating your Clerk Secret Key immediately. 1. Upgrade to the patched version of "@clerk/backend" (and "@clerk/express", "@clerk/hono", etc.) 2. Rotate your Clerk Secret Key after upgrading - if an attacker exploited this vulnerability, they may have captured your key. Rotate it in the "Clerk Dashboard" (https://dashboard.clerk.com) under API Keys. You should deploy your application with the updated key before revoking the existing key. 3. Audit access logs for requests to your proxy endpoint ("/__clerk/" by default) containing double slashes in the path. Credit Discovered during an internal code audit.
Affected Packages
@clerk/backend (NPM):
Affected version(s) >=3.0.0 <3.2.3Fix Suggestion:
Update to version 3.2.3@clerk/backend (NPM):
Affected version(s) >=3.0.0 <3.2.3Fix Suggestion:
Update to version 3.2.3@clerk/backend (NPM):
Affected version(s) >=3.0.0 <3.2.3Fix Suggestion:
Update to version 3.2.3@clerk/backend (NPM):
Affected version(s) >=3.0.0 <3.2.3Fix Suggestion:
Update to version 3.2.3@clerk/fastify (NPM):
Affected version(s) >=3.1.0 <3.1.5Fix Suggestion:
Update to version 3.1.5@clerk/fastify (NPM):
Affected version(s) >=3.1.0 <3.1.5Fix Suggestion:
Update to version 3.1.5@clerk/express (NPM):
Affected version(s) >=2.0.0 <2.0.7Fix Suggestion:
Update to version 2.0.7@clerk/express (NPM):
Affected version(s) >=2.0.0 <2.0.7Fix Suggestion:
Update to version 2.0.7@clerk/express (NPM):
Affected version(s) >=2.0.0 <2.0.7Fix Suggestion:
Update to version 2.0.7@clerk/fastify (NPM):
Affected version(s) >=3.1.0 <3.1.5Fix Suggestion:
Update to version 3.1.5@clerk/hono (NPM):
Affected version(s) >=0.1.0 <0.1.5Fix Suggestion:
Update to version 0.1.5@clerk/hono (NPM):
Affected version(s) >=0.1.0 <0.1.5Fix Suggestion:
Update to version 0.1.5@clerk/fastify (NPM):
Affected version(s) >=3.1.0 <3.1.5Fix Suggestion:
Update to version 3.1.5@clerk/express (NPM):
Affected version(s) >=2.0.0 <2.0.7Fix Suggestion:
Update to version 2.0.7@clerk/hono (NPM):
Affected version(s) >=0.1.0 <0.1.5Fix Suggestion:
Update to version 0.1.5@clerk/fastify (NPM):
Affected version(s) >=3.1.0 <3.1.5Fix Suggestion:
Update to version 3.1.5@clerk/hono (NPM):
Affected version(s) >=0.1.0 <0.1.5Fix Suggestion:
Update to version 0.1.5@clerk/hono (NPM):
Affected version(s) >=0.1.0 <0.1.5Fix Suggestion:
Update to version 0.1.5@clerk/express (NPM):
Affected version(s) >=2.0.0 <2.0.7Fix Suggestion:
Update to version 2.0.7@clerk/backend (NPM):
Affected version(s) >=3.0.0 <3.2.3Fix Suggestion:
Update to version 3.2.3@clerk/express (NPM):
Affected version(s) >=2.0.0 <2.0.7Fix Suggestion:
Update to version 2.0.7Related Resources (2)
Do you need more information?
Contact UsCVSS v4
Base Score:
9.1
Attack Vector
NETWORK
Attack Complexity
HIGH
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
7.4
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
NONE
Weakness Type (CWE)
Server-Side Request Forgery (SSRF)