Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-26rv-h2hf-3fw4

Опубликовано: 29 авг. 2025
Источник: github
Github: Прошло ревью
CVSS4: 5.3

Описание

Payload's SQLite adapter Session Fixation vulnerability

A Session Fixation vulnerability existed in Payload's SQLite adapter due to identifier reuse during account creation. A malicious attacker could create a new account, save its JSON Web Token (JWT), and then delete the account, which did not invalidate the JWT. As a result, the next newly created user would receive the same identifier, allowing the attacker to reuse the JWT to authenticate and perform actions as that user.

This issue has been fixed in version 3.44.0 of Payload.

Пакеты

Наименование

payload

npm
Затронутые версииВерсия исправления

< 3.44.0

3.44.0

Наименование

@payloadcms/next

npm
Затронутые версииВерсия исправления

< 3.44.0

3.44.0

Наименование

@payloadcms/graphql

npm
Затронутые версииВерсия исправления

< 3.44.0

3.44.0

EPSS

Процентиль: 17%
0.00053
Низкий

5.3 Medium

CVSS4

Дефекты

CWE-384

Связанные уязвимости

nvd
5 месяцев назад

A Session Fixation vulnerability existed in Payload's SQLite adapter due to identifier reuse during account creation. A malicious attacker could create a new account, save its JSON Web Token (JWT), and then delete the account, which did not invalidate the JWT. As a result, the next newly created user would receive the same identifier, allowing the attacker to reuse the JWT to authenticate and perform actions as that user. This issue has been fixed in version 3.44.0 of Payload.

EPSS

Процентиль: 17%
0.00053
Низкий

5.3 Medium

CVSS4

Дефекты

CWE-384