Cyber Posture

CVE-2025-64762

Critical

Published: 21 November 2025

Published
21 November 2025
Modified
11 December 2025
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0008 23.8th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.

Security Summary

CVE-2025-64762 affects the AuthKit library for Next.js, which provides authentication and session management helpers using WorkOS and AuthKit. In versions 2.11.0 and prior, authenticated responses lack defensive anti-caching headers, enabling session tokens to be cached and served to unintended users in environments with CDN caching enabled. This vulnerability, associated with CWE-524 (use of cache fields with cookie data), carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating critical severity due to high impacts on confidentiality and integrity.

Remote unauthenticated attackers can exploit this issue in deployments where CDN caching is active on authenticated paths, such as custom configurations beyond default Next.js on Vercel setups. By accessing cached responses, attackers receive session tokens from other users, potentially enabling session hijacking, account takeover, or unauthorized access to protected resources without direct interaction with the target application.

The vulnerability is patched in authkit-nextjs version 2.11.1, which adds anti-caching headers to all responses behind authentication. Developers should upgrade immediately and review caching configurations, particularly for CDNs. Official advisories, including the GitHub security advisory GHSA-p8pf-44ff-93gf, release notes for v2.11.1, and the patching commit 94cf438124993abb0e7c19dac64c3cb5724a15ea, provide full details on the fix. Next.js applications on Vercel remain unaffected unless caching is manually enabled on authenticated routes.

Details

CWE(s)
CWE-524

Affected Products

workos
authkit-nextjs
≤ 2.11.1

MITRE ATT&CK Enterprise Techniques

T1539 Steal Web Session Cookie Credential Access
An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.
Why these techniques?

The vulnerability causes authenticated responses containing session tokens to lack anti-caching headers, enabling them to be cached by CDNs and served to unauthorized users, directly facilitating the theft of web session cookies.

References