The Clerk WordPress plugin before 4.0.0 is affected by time-based attacks in the validation function for all API requests due to the usage of comparison operators to verify API keys against the ones stored in the site options.
                
            References
                    | Link | Resource | 
|---|---|
| https://wpscan.com/vulnerability/7920c1c1-709d-4b1f-ac08-f0a02ddb329c | Exploit Third Party Advisory | 
| https://wpscan.com/vulnerability/7920c1c1-709d-4b1f-ac08-f0a02ddb329c | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 07:20
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://wpscan.com/vulnerability/7920c1c1-709d-4b1f-ac08-f0a02ddb329c - Exploit, Third Party Advisory | 
21 Jul 2023, 20:26
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2022-12-05 17:15
Updated : 2025-04-23 15:15
NVD link : CVE-2022-3907
Mitre link : CVE-2022-3907
CVE.ORG link : CVE-2022-3907
JSON object : View
Products Affected
                clerk
- clerk.io
CWE
                
                    
                        
                        CWE-203
                        
            Observable Discrepancy
