Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-38f7-945m-qr2g | Effect `AsyncLocalStorage` context lost/contaminated inside Effect fibers under concurrent load with RPC |
Tue, 14 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Effectful
Effectful effect |
|
| CPEs | cpe:2.3:a:effectful:effect:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Effectful
Effectful effect |
Wed, 25 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Effect Project
Effect Project effect |
|
| Vendors & Products |
Effect Project
Effect Project effect |
Fri, 20 Mar 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Effect is a TypeScript framework that consists of several packages that work together to help build TypeScript applications. Prior to version 3.20.0, when using `RpcServer.toWebHandler` (or `HttpApp.toWebHandlerRuntime`) inside a Next.js App Router route handler, any Node.js `AsyncLocalStorage`-dependent API called from within an Effect fiber can read another concurrent request's context — or no context at all. Under production traffic, `auth()` from `@clerk/nextjs/server` returns a different user's session. Version 3.20.0 contains a fix for the issue. | |
| Title | Effect Bug: `AsyncLocalStorage` context lost/contaminated inside Effect fibers under concurrent load with RPC | |
| Weaknesses | CWE-362 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-25T13:37:15.940Z
Reserved: 2026-03-16T21:03:44.421Z
Link: CVE-2026-32887
Updated: 2026-03-25T13:37:05.082Z
Status : Analyzed
Published: 2026-03-20T22:16:27.980
Modified: 2026-04-14T18:41:28.923
Link: CVE-2026-32887
No data.
OpenCVE Enrichment
Updated: 2026-04-15T16:45:09Z
Github GHSA