CVE-2025-64762: CWE-524: Use of Cache Containing Sensitive Information in workos authkit-nextjs
The AuthKit library for Next.js provides convenient helpers for authentication and session management using WorkOS & AuthKit with Next.js. In authkit-nextjs version 2.11.0 and below, authenticated responses do not defensively apply anti-caching headers. In environments where CDN caching is enabled, this can result in session tokens being included in cached responses and subsequently served to multiple users. Next.js applications deployed on Vercel are unaffected unless they manually enable CDN caching by setting cache headers on authenticated paths. Patched in authkit-nextjs 2.11.1, which applies anti-caching headers to all responses behind authentication.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-64762 affects the authkit-nextjs library, a tool designed to facilitate authentication and session management in Next.js applications using WorkOS. Versions prior to 2.11.1 fail to apply anti-caching headers on authenticated HTTP responses. In environments where CDN caching is enabled for these responses, session tokens embedded in the responses can be cached and subsequently served to multiple users, violating confidentiality and session integrity. This is classified under CWE-524, which concerns the use of caches containing sensitive information. The vulnerability is exploitable remotely without authentication or user interaction, as indicated by the CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N). The impact on confidentiality and integrity is high, as session tokens can be leaked to unauthorized parties, potentially allowing session hijacking and unauthorized access to user accounts. The vulnerability does not affect Next.js applications deployed on Vercel by default, as Vercel does not enable CDN caching on authenticated paths unless explicitly configured. The patch released in version 2.11.1 mitigates the issue by enforcing anti-caching headers on all authenticated responses, preventing CDNs from caching sensitive session data. No known exploits have been reported in the wild, but the high CVSS score reflects the critical nature of the risk if exploited.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of user sessions in web applications using authkit-nextjs versions below 2.11.1 with CDN caching enabled. If exploited, attackers could gain unauthorized access to user accounts by retrieving cached session tokens from CDN caches. This can lead to data breaches, unauthorized transactions, and compromise of sensitive personal or corporate information. Organizations in sectors with strict data protection regulations such as GDPR (e.g., finance, healthcare, government) face heightened compliance risks and potential legal penalties if session data is leaked. The risk is amplified in multi-tenant or shared CDN environments where cached responses might be served to unintended users. Additionally, the breach of session tokens can undermine user trust and damage organizational reputation. The vulnerability's ease of exploitation without authentication or user interaction increases the urgency for mitigation. However, organizations using Vercel's default deployment are less likely to be affected unless they explicitly enable CDN caching on authenticated routes.
Mitigation Recommendations
European organizations should immediately upgrade authkit-nextjs to version 2.11.1 or later to ensure anti-caching headers are applied to all authenticated responses. For environments where upgrading is not immediately feasible, organizations should audit CDN configurations to ensure caching is disabled on any authenticated or session-sensitive endpoints. This includes setting appropriate Cache-Control headers such as 'no-store', 'no-cache', 'private', and 'must-revalidate' to prevent caching of sensitive data. Implement strict Content Security Policies and monitor CDN cache behavior regularly to detect any inadvertent caching of sensitive information. Additionally, review and restrict CDN edge caching rules to exclude authenticated paths. Conduct security testing to verify that session tokens are not exposed in cached responses. Educate development teams about secure caching practices and the risks of caching authenticated content. For organizations using Vercel, verify that no manual cache headers are set on authenticated routes. Finally, implement robust session management practices, including short session lifetimes and token revocation mechanisms, to limit the impact of any potential token leakage.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-64762: CWE-524: Use of Cache Containing Sensitive Information in workos authkit-nextjs
Description
The AuthKit library for Next.js provides convenient helpers for authentication and session management using WorkOS & AuthKit with Next.js. In authkit-nextjs version 2.11.0 and below, authenticated responses do not defensively apply anti-caching headers. In environments where CDN caching is enabled, this can result in session tokens being included in cached responses and subsequently served to multiple users. Next.js applications deployed on Vercel are unaffected unless they manually enable CDN caching by setting cache headers on authenticated paths. Patched in authkit-nextjs 2.11.1, which applies anti-caching headers to all responses behind authentication.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-64762 affects the authkit-nextjs library, a tool designed to facilitate authentication and session management in Next.js applications using WorkOS. Versions prior to 2.11.1 fail to apply anti-caching headers on authenticated HTTP responses. In environments where CDN caching is enabled for these responses, session tokens embedded in the responses can be cached and subsequently served to multiple users, violating confidentiality and session integrity. This is classified under CWE-524, which concerns the use of caches containing sensitive information. The vulnerability is exploitable remotely without authentication or user interaction, as indicated by the CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N). The impact on confidentiality and integrity is high, as session tokens can be leaked to unauthorized parties, potentially allowing session hijacking and unauthorized access to user accounts. The vulnerability does not affect Next.js applications deployed on Vercel by default, as Vercel does not enable CDN caching on authenticated paths unless explicitly configured. The patch released in version 2.11.1 mitigates the issue by enforcing anti-caching headers on all authenticated responses, preventing CDNs from caching sensitive session data. No known exploits have been reported in the wild, but the high CVSS score reflects the critical nature of the risk if exploited.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of user sessions in web applications using authkit-nextjs versions below 2.11.1 with CDN caching enabled. If exploited, attackers could gain unauthorized access to user accounts by retrieving cached session tokens from CDN caches. This can lead to data breaches, unauthorized transactions, and compromise of sensitive personal or corporate information. Organizations in sectors with strict data protection regulations such as GDPR (e.g., finance, healthcare, government) face heightened compliance risks and potential legal penalties if session data is leaked. The risk is amplified in multi-tenant or shared CDN environments where cached responses might be served to unintended users. Additionally, the breach of session tokens can undermine user trust and damage organizational reputation. The vulnerability's ease of exploitation without authentication or user interaction increases the urgency for mitigation. However, organizations using Vercel's default deployment are less likely to be affected unless they explicitly enable CDN caching on authenticated routes.
Mitigation Recommendations
European organizations should immediately upgrade authkit-nextjs to version 2.11.1 or later to ensure anti-caching headers are applied to all authenticated responses. For environments where upgrading is not immediately feasible, organizations should audit CDN configurations to ensure caching is disabled on any authenticated or session-sensitive endpoints. This includes setting appropriate Cache-Control headers such as 'no-store', 'no-cache', 'private', and 'must-revalidate' to prevent caching of sensitive data. Implement strict Content Security Policies and monitor CDN cache behavior regularly to detect any inadvertent caching of sensitive information. Additionally, review and restrict CDN edge caching rules to exclude authenticated paths. Conduct security testing to verify that session tokens are not exposed in cached responses. Educate development teams about secure caching practices and the risks of caching authenticated content. For organizations using Vercel, verify that no manual cache headers are set on authenticated routes. Finally, implement robust session management practices, including short session lifetimes and token revocation mechanisms, to limit the impact of any potential token leakage.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-10T22:29:34.876Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691fc3ff70da09562fa7fca7
Added to database: 11/21/2025, 1:44:31 AM
Last enriched: 11/21/2025, 1:59:28 AM
Last updated: 11/21/2025, 3:05:00 PM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-41115: Vulnerability in Grafana Grafana Enterprise
CriticalCVE-2025-13432: CWE-863: Incorrect Authorization in HashiCorp Terraform Enterprise
MediumCVE-2025-11127: CWE-639 Authorization Bypass Through User-Controlled Key in Mstoreapp Mobile App
CriticalCVE-2025-66115: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in MatrixAddons Easy Invoice
UnknownCVE-2025-66114: Missing Authorization in theme funda Show Variations as Single Products Woocommerce
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.