CVE-2025-4644: CWE-384 Session Fixation in Payload CMS Payload
A Session Fixation vulnerability existed in Payload's SQLite adapter due to identifier reuse during account creation. A malicious attacker could create a new account, save its JSON Web Token (JWT), and then delete the account, which did not invalidate the JWT. As a result, the next newly created user would receive the same identifier, allowing the attacker to reuse the JWT to authenticate and perform actions as that user. This issue has been fixed in version 3.44.0 of Payload.
AI Analysis
Technical Summary
CVE-2025-4644 is a session fixation vulnerability identified in the Payload CMS, specifically within its SQLite adapter implementation. The root cause of this vulnerability lies in the reuse of user identifiers during account creation. An attacker can exploit this flaw by first creating a new user account and capturing the associated JSON Web Token (JWT) issued for that account. Subsequently, the attacker deletes the created account; however, the JWT remains valid because the system does not invalidate tokens upon account deletion. When a new user account is created afterward, the system reassigns the same identifier that was previously used by the deleted account. This identifier reuse allows the attacker to reuse the previously captured JWT to authenticate as the new user, effectively hijacking the session and gaining unauthorized access. This vulnerability is classified under CWE-384 (Session Fixation) and affects Payload CMS versions prior to 3.44.0, where the issue has been resolved. The CVSS v4.0 base score is 5.3, indicating a medium severity level. The attack vector is network-based with low attack complexity and does not require privileges or user interaction, but it does require the attacker to perform specific steps to create and delete accounts to exploit the flaw. The impact on confidentiality and integrity is low to limited, as the attacker can impersonate a user but cannot escalate privileges beyond that user's rights. Availability is not affected. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations using Payload CMS, this vulnerability poses a risk of unauthorized access through session fixation, potentially allowing attackers to impersonate legitimate users. This can lead to unauthorized data access, modification, or actions performed under the guise of the compromised user. While the impact is limited to the permissions of the affected user, in environments where user roles have elevated privileges or access to sensitive data, the consequences could be significant. This risk is particularly relevant for organizations managing sensitive content, personal data, or critical business workflows via Payload CMS. Additionally, the persistence of valid JWTs after account deletion could complicate incident response and forensic investigations. Given the medium severity and the ease of exploitation without requiring authentication, European organizations should prioritize patching to prevent potential exploitation. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.
Mitigation Recommendations
European organizations should upgrade Payload CMS to version 3.44.0 or later, where this vulnerability is fixed. Until the patch is applied, organizations should implement the following specific mitigations: 1) Monitor and audit account creation and deletion activities to detect suspicious patterns, such as rapid creation and deletion of accounts. 2) Implement additional validation or rate limiting on account creation endpoints to prevent automated abuse. 3) Invalidate JWTs immediately upon account deletion by implementing custom token revocation mechanisms if possible. 4) Review and restrict user permissions to minimize the impact of potential account impersonation. 5) Employ Web Application Firewalls (WAFs) with rules targeting suspicious account management behaviors. 6) Educate administrators and users about the risks of session fixation and encourage prompt reporting of unusual account activities. These targeted actions complement the patch and reduce the window of exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-4644: CWE-384 Session Fixation in Payload CMS Payload
Description
A Session Fixation vulnerability existed in Payload's SQLite adapter due to identifier reuse during account creation. A malicious attacker could create a new account, save its JSON Web Token (JWT), and then delete the account, which did not invalidate the JWT. As a result, the next newly created user would receive the same identifier, allowing the attacker to reuse the JWT to authenticate and perform actions as that user. This issue has been fixed in version 3.44.0 of Payload.
AI-Powered Analysis
Technical Analysis
CVE-2025-4644 is a session fixation vulnerability identified in the Payload CMS, specifically within its SQLite adapter implementation. The root cause of this vulnerability lies in the reuse of user identifiers during account creation. An attacker can exploit this flaw by first creating a new user account and capturing the associated JSON Web Token (JWT) issued for that account. Subsequently, the attacker deletes the created account; however, the JWT remains valid because the system does not invalidate tokens upon account deletion. When a new user account is created afterward, the system reassigns the same identifier that was previously used by the deleted account. This identifier reuse allows the attacker to reuse the previously captured JWT to authenticate as the new user, effectively hijacking the session and gaining unauthorized access. This vulnerability is classified under CWE-384 (Session Fixation) and affects Payload CMS versions prior to 3.44.0, where the issue has been resolved. The CVSS v4.0 base score is 5.3, indicating a medium severity level. The attack vector is network-based with low attack complexity and does not require privileges or user interaction, but it does require the attacker to perform specific steps to create and delete accounts to exploit the flaw. The impact on confidentiality and integrity is low to limited, as the attacker can impersonate a user but cannot escalate privileges beyond that user's rights. Availability is not affected. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations using Payload CMS, this vulnerability poses a risk of unauthorized access through session fixation, potentially allowing attackers to impersonate legitimate users. This can lead to unauthorized data access, modification, or actions performed under the guise of the compromised user. While the impact is limited to the permissions of the affected user, in environments where user roles have elevated privileges or access to sensitive data, the consequences could be significant. This risk is particularly relevant for organizations managing sensitive content, personal data, or critical business workflows via Payload CMS. Additionally, the persistence of valid JWTs after account deletion could complicate incident response and forensic investigations. Given the medium severity and the ease of exploitation without requiring authentication, European organizations should prioritize patching to prevent potential exploitation. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.
Mitigation Recommendations
European organizations should upgrade Payload CMS to version 3.44.0 or later, where this vulnerability is fixed. Until the patch is applied, organizations should implement the following specific mitigations: 1) Monitor and audit account creation and deletion activities to detect suspicious patterns, such as rapid creation and deletion of accounts. 2) Implement additional validation or rate limiting on account creation endpoints to prevent automated abuse. 3) Invalidate JWTs immediately upon account deletion by implementing custom token revocation mechanisms if possible. 4) Review and restrict user permissions to minimize the impact of potential account impersonation. 5) Employ Web Application Firewalls (WAFs) with rules targeting suspicious account management behaviors. 6) Educate administrators and users about the risks of session fixation and encourage prompt reporting of unusual account activities. These targeted actions complement the patch and reduce the window of exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2025-05-13T07:10:08.331Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b17e4cad5a09ad0076acf9
Added to database: 8/29/2025, 10:17:48 AM
Last enriched: 8/29/2025, 10:32:47 AM
Last updated: 8/29/2025, 10:51:22 AM
Views: 3
Related Threats
CVE-2025-40709: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ACDH-CH OpenAtlas
MediumCVE-2025-40708: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ACDH-CH OpenAtlas
MediumCVE-2025-40707: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ACDH-CH OpenAtlas
MediumCVE-2025-40706: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ACDH-CH OpenAtlas
MediumCVE-2025-9217: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Revolution Slider Slider Revolution
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.