ghsa-26rv-h2hf-3fw4
Vulnerability from github
Published
2025-08-29 12:31
Modified
2025-08-29 16:59
Severity ?
VLAI Severity ?
Summary
Payload's SQLite adapter Session Fixation vulnerability
Details
A Session Fixation vulnerability existed in Payload's SQLite adapter due to identifier reuse during account creation. A malicious attacker could create a new account, save its JSON Web Token (JWT), and then delete the account, which did not invalidate the JWT. As a result, the next newly created user would receive the same identifier, allowing the attacker to reuse the JWT to authenticate and perform actions as that user.
This issue has been fixed in version 3.44.0 of Payload.
{ "affected": [ { "package": { "ecosystem": "npm", "name": "payload" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "3.44.0" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "npm", "name": "@payloadcms/next" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "3.44.0" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "npm", "name": "@payloadcms/graphql" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "3.44.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-4644" ], "database_specific": { "cwe_ids": [ "CWE-384" ], "github_reviewed": true, "github_reviewed_at": "2025-08-29T16:59:05Z", "nvd_published_at": "2025-08-29T10:15:32Z", "severity": "MODERATE" }, "details": "A Session Fixation vulnerability existed in Payload\u0027s SQLite adapter due to identifier reuse during account creation. A malicious attacker could create a new account, save its JSON Web Token (JWT), and then delete the account, which did not invalidate the JWT. As a result, the next newly created user would receive the same identifier, allowing the attacker to reuse the JWT to authenticate and perform actions as that user.\n\nThis issue has been fixed in version 3.44.0 of Payload.", "id": "GHSA-26rv-h2hf-3fw4", "modified": "2025-08-29T16:59:05Z", "published": "2025-08-29T12:31:11Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4644" }, { "type": "WEB", "url": "https://github.com/payloadcms/payload/commit/26d709dda6e512ce347557eaa2057db6e0cbf809" }, { "type": "WEB", "url": "https://cert.pl/en/posts/2025/08/CVE-2025-4643" }, { "type": "PACKAGE", "url": "https://github.com/payloadcms/payload" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "Payload\u0027s SQLite adapter Session Fixation vulnerability" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…