Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64762: CWE-524: Use of Cache Containing Sensitive Information in workos authkit-nextjs

0
High
VulnerabilityCVE-2025-64762cvecve-2025-64762cwe-524
Published: Fri Nov 21 2025 (11/21/2025, 01:29:22 UTC)
Source: CVE Database V5
Vendor/Project: workos
Product: authkit-nextjs

Description

The AuthKit library for Next.js provides convenient helpers for authentication and session management using WorkOS & AuthKit with Next.js. In authkit-nextjs version 2.11.0 and below, authenticated responses do not defensively apply anti-caching headers. In environments where CDN caching is enabled, this can result in session tokens being included in cached responses and subsequently served to multiple users. Next.js applications deployed on Vercel are unaffected unless they manually enable CDN caching by setting cache headers on authenticated paths. Patched in authkit-nextjs 2.11.1, which applies anti-caching headers to all responses behind authentication.

AI-Powered Analysis

AILast updated: 11/28/2025, 04:42:49 UTC

Technical Analysis

The vulnerability identified as CVE-2025-64762 affects authkit-nextjs, a library facilitating authentication and session management in Next.js applications integrated with WorkOS. Versions prior to 2.11.1 fail to apply anti-caching HTTP headers on authenticated responses. In environments where CDN caching is enabled, this oversight allows session tokens and other sensitive authentication data to be cached by intermediary CDN nodes. Consequently, these cached responses can be served to other users, leading to session token leakage and unauthorized access. The vulnerability is categorized under CWE-524, which concerns the use of caches containing sensitive information. The issue does not require authentication or user interaction to exploit and can be triggered remotely over the network. The CVSS 4.0 base score is 8.0, reflecting high severity due to the ease of exploitation and the critical impact on confidentiality and integrity. Notably, Next.js applications deployed on Vercel are not vulnerable by default, as Vercel does not enable CDN caching on authenticated paths unless explicitly configured. The fix introduced in authkit-nextjs version 2.11.1 adds appropriate anti-caching headers to all authenticated responses, preventing sensitive data from being cached and served to unauthorized parties. While no active exploits have been reported, the vulnerability poses a significant risk in any deployment scenario where CDN caching is enabled on authenticated endpoints.

Potential Impact

For European organizations, this vulnerability can lead to severe data breaches involving session tokens, enabling attackers to impersonate legitimate users and access sensitive resources. This compromises user confidentiality and integrity, potentially exposing personal data protected under GDPR. Organizations relying on authkit-nextjs for authentication in customer-facing or internal applications that use CDN caching are particularly at risk. The exposure of session tokens can facilitate lateral movement within networks, privilege escalation, and unauthorized data access. The impact extends to reputational damage, regulatory penalties, and operational disruptions. Given the widespread adoption of Next.js and WorkOS in Europe’s tech ecosystem, especially among SaaS providers and enterprises leveraging modern web frameworks, the threat is significant. The risk is heightened in sectors with stringent compliance requirements such as finance, healthcare, and government services. Additionally, organizations using custom CDN configurations or self-hosted CDN solutions are more vulnerable compared to those on managed platforms like Vercel that do not enable caching on authenticated routes by default.

Mitigation Recommendations

European organizations should immediately upgrade authkit-nextjs to version 2.11.1 or later to ensure anti-caching headers are applied to all authenticated responses. Review and audit CDN configurations to confirm that caching is disabled on any endpoints handling authentication or session tokens. Implement strict cache-control headers such as 'Cache-Control: no-store, no-cache, must-revalidate, proxy-revalidate' and 'Pragma: no-cache' on all sensitive routes. Conduct penetration testing and code reviews to verify that no other endpoints inadvertently expose sensitive data via caching. For organizations using custom or third-party CDNs, enforce policies that prevent caching of authenticated content. Additionally, monitor access logs and CDN cache hit/miss ratios for anomalies that could indicate token leakage. Educate development teams on secure caching practices and the risks of caching sensitive information. Finally, consider implementing short-lived session tokens and multi-factor authentication to reduce the impact of any potential token exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-10T22:29:34.876Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691fc3ff70da09562fa7fca7

Added to database: 11/21/2025, 1:44:31 AM

Last enriched: 11/28/2025, 4:42:49 AM

Last updated: 1/7/2026, 4:19:09 AM

Views: 127

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats