Описание
The AuthKit Remix Library renders sensitive auth data in HTML
Summary
Before 0.15.0, @workos-inc/authkit-remix returned sensitive authentication artifacts from the authkitLoader, specifically sealedSession and accessToken. Because these values were returned from the loader, they were embedded into the server-rendered HTML and became readable by any script with access to the page’s DOM (e.g., in the presence of XSS or a malicious browser extension).
- Impact: Exposure of these secrets can lead to session hijacking and unauthorized API access.
- Fix: Version
0.15.0changes the default behavior so the loader no longer returnssealedSession/accessToken. A secure server-side mechanism is provided to fetch an access token when needed.
Patches
Patched in v0.15.0.
Ссылки
- https://github.com/workos/authkit-remix/security/advisories/GHSA-v3gr-w9gf-23cx
- https://nvd.nist.gov/vuln/detail/CVE-2025-55009
- https://github.com/workos/authkit-remix/commit/20102afc74bf3dd5150a975a098067fb406b90b6
- https://github.com/workos/authkit-remix/releases/tag/v0.15.0
- https://osv.dev/vulnerability/CVE-2025-55009
- https://osv.dev/vulnerability/GHSA-v3gr-w9gf-23cx
Пакеты
@workos-inc/authkit-remix
< 0.15.0
0.15.0
Связанные уязвимости
The AuthKit library for Remix provides convenient helpers for authentication and session management using WorkOS & AuthKit with Remix. In versions 0.14.1 and below, @workos-inc/authkit-remix exposed sensitive authentication artifacts — specifically sealedSession and accessToken — by returning them from the authkitLoader. This caused them to be rendered into the browser HTML.