Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Dirty Frag Linux Vulnerability Allows Root Privileges Access
May 8, 2026
Next.js & React Server Components: Critical Vulnerabilities Pat
May 8, 2026
Ivanti EPMM 0-Day Vulnerability Actively Exploited Attacks
May 7, 2026
Home/CyberSecurity News/Critical Cal.com Flaw Lets Attackers Hijack User Vulnerability Bypass
CyberSecurity News

Critical Cal.com Flaw Lets Attackers Hijack User Vulnerability Bypass

A critical authentication bypass vulnerability impacting Cal.com’s scheduling platform allows attackers to hijack any user account. This flaw exploits a weakness in the NextAuth JWT callback...

Jennifer sherman
Jennifer sherman
January 15, 2026 2 Min Read
2 0

A critical authentication bypass vulnerability impacting Cal.com’s scheduling platform allows attackers to hijack any user account. This flaw exploits a weakness in the NextAuth JWT callback mechanism.

Tracked as CVE-2026-23478, this vulnerability affects versions from 3.1.6 up to but not including 6.0.7, with patches available in version 6.0.7 and later.

The vulnerability resides in a custom NextAuth JWT callback that improperly handles client-controlled identity fields during session updates.

When the trigger condition is set to “update,” the callback writes user-supplied data directly into the JSON Web Token without server-side validation.

Detail Information
CVE ID CVE-2026-23478
Affected Versions >= 3.1.6 < 6.0.7
CVSS v4 Score Critical / 10
Attack Vector Network
CWE-602 Client-Side Enforcement of Server-Side Security
CWE-639 Authorization Bypass Through User-Controlled Key

An attacker can execute a single API call to the session.update({email: “[email protected]”}), which modifies the JWT to contain both the attacker’s subject identifier (sub: attackerId) and the victim’s email address.

Subsequent requests using this manipulated JWT authenticate as the victim because the application queries the user database using the attacker-controlled token email field.

The session is constructed entirely from the victim’s database record, granting immediate full authenticated access.

Security controls such as two-factor authentication and external identity provider associations do not prevent this attack, as the compromise occurs at the session token level after successful authentication.

Impact and Response

Successful exploitation grants attackers complete control over victim accounts, including access to all bookings, event types, integrations, organization memberships, billing information, and administrative privileges.

The attack requires only knowledge of the target’s email address and a single API call, making it trivial to execute at scale. Cal.com immediately patched hosted deployments upon discovery.

Security researcher reported the vulnerability jaydns through Veri-Labs, and maintainers state they do not indicate active exploitation in the wild.

According to the advisory, organizations running self-hosted Cal.com instances must upgrade to version 6.0.7 or later immediately to mitigate this critical risk.

The flaw demonstrates how client-side control of server-side security mechanisms can undermine entire authentication architectures, even in platforms with robust security features.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityVulnerability

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Microsoft & Authorities Dismantle RedVDS BEC Attack Chain

Next Post

Firefox 147 Released With Fixes for 16 Vulnerabilities that Enable

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Use Fake Claude AI Installers to Infect Systems
May 7, 2026
UAT-8302 Uses Custom Malware and Open-Source Tools to Steal Data
May 7, 2026
Scammers Evade Blocking Using VoIP and Reused Windows
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us