CVE-2026-45773 PUBLISHED

Turborepo: Login callback CSRF/session fixation

Assigner: GitHub_M
Reserved: 13.05.2026 Published: 15.05.2026 Updated: 15.05.2026

Turborepo is a high-performance build system for JavaScript and TypeScript codebases. Prior to 2.9.14, Turborepo's self-hosted login and SSO browser flows did not validate a CSRF state value on the localhost callback. While the CLI was waiting for authentication, a malicious web page could send a request to the local callback server with an attacker-controlled token. If accepted before the legitimate callback, the CLI could complete login with the wrong credentials. This affects users authenticating the turbo CLI against self-hosted remote cache/auth endpoints. Vercel-hosted login flows using device authorization are not affected. This vulnerability is fixed in 2.9.14.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:L/SI:H/SA:N
CVSS Score: 5.1

Product Status

Vendor vercel
Product turborepo
Versions
  • Version < 2.9.14 is affected

References

Problem Types

  • CWE-352: Cross-Site Request Forgery (CSRF) CWE
  • CWE-384: Session Fixation CWE