high
Security Vulnerability

Weak Authentication

Weak authentication allows attackers to gain unauthorized access through password guessing, session hijacking, or bypassing login controls.

Scan for This Vulnerability

What is Weak Authentication?

Authentication is your first line of defense. Weak configurations like no password requirements, missing rate limiting, or insecure sessions make it easy for attackers to compromise accounts. Even with otherwise secure code, weak auth can lead to complete account takeover.

How It Happens

  • No minimum password length or complexity requirements
  • Missing email verification
  • No rate limiting on login endpoints
  • Insecure session handling (no HttpOnly, Secure flags)
  • Default auth configurations not hardened

Impact

Account takeover through credential stuffing

Brute force attacks succeed without rate limiting

Session hijacking if cookies are insecure

Fake accounts if email verification is missing

Data breaches through compromised accounts

How to Detect

  • Try creating an account with a weak password
  • Test login endpoint for rate limiting
  • Check cookie flags in browser DevTools
  • Verify email verification is required
  • Run VAS to test auth configuration

How to Fix

Enforce password requirements

Require minimum length and complexity.

// Supabase Auth config
{
  password_min_length: 8,
  // Consider additional complexity rules
}

Enable email verification

Require users to confirm their email before accessing the app.

Implement rate limiting

Limit login attempts to prevent brute force attacks.

// Rate limit example
const rateLimit = {
  windowMs: 15 * 60 * 1000, // 15 minutes
  max: 5 // 5 attempts per window
};

Secure session cookies

Set appropriate flags on authentication cookies.

// Cookie settings
{
  httpOnly: true, // Not accessible via JavaScript
  secure: true,   // HTTPS only
  sameSite: 'lax' // CSRF protection
}

Is Your App Vulnerable?

VAS automatically scans for weak authentication and provides detailed remediation guidance.

Run Security Scan