JustAppSec
Back to news

Clerk patches SSRF that leaks Clerk-Secret-Key

1 min readPublished 01 Apr 2026Updated 01 Apr 2026Source: CVEProject (cvelistV5)

TL;DR — A High-severity SSRF in Clerk’s clerkFrontendApiProxy can leak an application’s Clerk-Secret-Key to an attacker-controlled host via a crafted request path.

What happened

Clerk is an authentication/identity platform; the @clerk/* server SDKs are used in backend services to integrate Clerk auth and related API calls.

CVE-2026-34076 (GitHub CNA publication) reports that the clerkFrontendApiProxy function in @clerk/backend is vulnerable to Server-Side Request Forgery (SSRF). Per the CVE record, an unauthenticated attacker can craft a request path that causes the proxy to send the application’s Clerk-Secret-Key to an attacker-controlled server.

Severity is CVSS v3.1 7.4 (High). SSRF in proxy/helper code is a high-signal class because it often turns “just routing” logic into a secret-exfiltration primitive when backend credentials are attached to outbound requests.

Who is impacted

  • Deployments using affected versions of Clerk’s JavaScript server SDKs where the opt-in clerkFrontendApiProxy behavior is reachable.
ComponentAffected versions (per CVE record)Patched versions (per CVE record)
@clerk/hono>= 0.1.0, < 0.1.50.1.5
@clerk/express>= 2.0.0, < 2.0.72.0.7
@clerk/backend>= 3.0.0, < 3.2.33.2.3
@clerk/fastify>= 3.1.0, < 3.1.53.1.5

What to do now

  • Follow vendor remediation guidance and apply the patched releases described in the CVE record.
    • "This issue has been patched in @clerk/hono version 0.1.5, @clerk/express version 2.0.7, @clerk/backend version 3.2.3, and @clerk/fastify version 3.1.5."

  • Inventory services that depend on @clerk/backend, @clerk/express, @clerk/fastify, or @clerk/hono, and confirm whether clerkFrontendApiProxy is enabled/reachable in production request paths.
  • Treat potential Clerk-Secret-Key exposure as a credential incident: if you suspect abuse (unexpected outbound requests, suspicious proxy paths, or unknown hosts receiving traffic), rotate the affected application secret and review egress logs around the proxy feature.

Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.