CVE-2025-64762: CWE-524: Use of Cache Containing Sensitive Information in workos authkit-nextjs
The AuthKit library for Next.js provides convenient helpers for authentication and session management using WorkOS & AuthKit with Next.js. In authkit-nextjs version 2.11.0 and below, authenticated responses do not defensively apply anti-caching headers. In environments where CDN caching is enabled, this can result in session tokens being included in cached responses and subsequently served to multiple users. Next.js applications deployed on Vercel are unaffected unless they manually enable CDN caching by setting cache headers on authenticated paths. Patched in authkit-nextjs 2.11.1, which applies anti-caching headers to all responses behind authentication.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-64762 affects authkit-nextjs, a library facilitating authentication and session management in Next.js applications integrated with WorkOS. Versions prior to 2.11.1 fail to apply anti-caching HTTP headers on authenticated responses. In environments where CDN caching is enabled, this oversight allows session tokens and other sensitive authentication data to be cached by intermediary CDN nodes. Consequently, these cached responses can be served to other users, leading to session token leakage and unauthorized access. The vulnerability is categorized under CWE-524, which concerns the use of caches containing sensitive information. The issue does not require authentication or user interaction to exploit and can be triggered remotely over the network. The CVSS 4.0 base score is 8.0, reflecting high severity due to the ease of exploitation and the critical impact on confidentiality and integrity. Notably, Next.js applications deployed on Vercel are not vulnerable by default, as Vercel does not enable CDN caching on authenticated paths unless explicitly configured. The fix introduced in authkit-nextjs version 2.11.1 adds appropriate anti-caching headers to all authenticated responses, preventing sensitive data from being cached and served to unauthorized parties. While no active exploits have been reported, the vulnerability poses a significant risk in any deployment scenario where CDN caching is enabled on authenticated endpoints.
Potential Impact
For European organizations, this vulnerability can lead to severe data breaches involving session tokens, enabling attackers to impersonate legitimate users and access sensitive resources. This compromises user confidentiality and integrity, potentially exposing personal data protected under GDPR. Organizations relying on authkit-nextjs for authentication in customer-facing or internal applications that use CDN caching are particularly at risk. The exposure of session tokens can facilitate lateral movement within networks, privilege escalation, and unauthorized data access. The impact extends to reputational damage, regulatory penalties, and operational disruptions. Given the widespread adoption of Next.js and WorkOS in Europe’s tech ecosystem, especially among SaaS providers and enterprises leveraging modern web frameworks, the threat is significant. The risk is heightened in sectors with stringent compliance requirements such as finance, healthcare, and government services. Additionally, organizations using custom CDN configurations or self-hosted CDN solutions are more vulnerable compared to those on managed platforms like Vercel that do not enable caching on authenticated routes by default.
Mitigation Recommendations
European organizations should immediately upgrade authkit-nextjs to version 2.11.1 or later to ensure anti-caching headers are applied to all authenticated responses. Review and audit CDN configurations to confirm that caching is disabled on any endpoints handling authentication or session tokens. Implement strict cache-control headers such as 'Cache-Control: no-store, no-cache, must-revalidate, proxy-revalidate' and 'Pragma: no-cache' on all sensitive routes. Conduct penetration testing and code reviews to verify that no other endpoints inadvertently expose sensitive data via caching. For organizations using custom or third-party CDNs, enforce policies that prevent caching of authenticated content. Additionally, monitor access logs and CDN cache hit/miss ratios for anomalies that could indicate token leakage. Educate development teams on secure caching practices and the risks of caching sensitive information. Finally, consider implementing short-lived session tokens and multi-factor authentication to reduce the impact of any potential token exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-64762: CWE-524: Use of Cache Containing Sensitive Information in workos authkit-nextjs
Description
The AuthKit library for Next.js provides convenient helpers for authentication and session management using WorkOS & AuthKit with Next.js. In authkit-nextjs version 2.11.0 and below, authenticated responses do not defensively apply anti-caching headers. In environments where CDN caching is enabled, this can result in session tokens being included in cached responses and subsequently served to multiple users. Next.js applications deployed on Vercel are unaffected unless they manually enable CDN caching by setting cache headers on authenticated paths. Patched in authkit-nextjs 2.11.1, which applies anti-caching headers to all responses behind authentication.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-64762 affects authkit-nextjs, a library facilitating authentication and session management in Next.js applications integrated with WorkOS. Versions prior to 2.11.1 fail to apply anti-caching HTTP headers on authenticated responses. In environments where CDN caching is enabled, this oversight allows session tokens and other sensitive authentication data to be cached by intermediary CDN nodes. Consequently, these cached responses can be served to other users, leading to session token leakage and unauthorized access. The vulnerability is categorized under CWE-524, which concerns the use of caches containing sensitive information. The issue does not require authentication or user interaction to exploit and can be triggered remotely over the network. The CVSS 4.0 base score is 8.0, reflecting high severity due to the ease of exploitation and the critical impact on confidentiality and integrity. Notably, Next.js applications deployed on Vercel are not vulnerable by default, as Vercel does not enable CDN caching on authenticated paths unless explicitly configured. The fix introduced in authkit-nextjs version 2.11.1 adds appropriate anti-caching headers to all authenticated responses, preventing sensitive data from being cached and served to unauthorized parties. While no active exploits have been reported, the vulnerability poses a significant risk in any deployment scenario where CDN caching is enabled on authenticated endpoints.
Potential Impact
For European organizations, this vulnerability can lead to severe data breaches involving session tokens, enabling attackers to impersonate legitimate users and access sensitive resources. This compromises user confidentiality and integrity, potentially exposing personal data protected under GDPR. Organizations relying on authkit-nextjs for authentication in customer-facing or internal applications that use CDN caching are particularly at risk. The exposure of session tokens can facilitate lateral movement within networks, privilege escalation, and unauthorized data access. The impact extends to reputational damage, regulatory penalties, and operational disruptions. Given the widespread adoption of Next.js and WorkOS in Europe’s tech ecosystem, especially among SaaS providers and enterprises leveraging modern web frameworks, the threat is significant. The risk is heightened in sectors with stringent compliance requirements such as finance, healthcare, and government services. Additionally, organizations using custom CDN configurations or self-hosted CDN solutions are more vulnerable compared to those on managed platforms like Vercel that do not enable caching on authenticated routes by default.
Mitigation Recommendations
European organizations should immediately upgrade authkit-nextjs to version 2.11.1 or later to ensure anti-caching headers are applied to all authenticated responses. Review and audit CDN configurations to confirm that caching is disabled on any endpoints handling authentication or session tokens. Implement strict cache-control headers such as 'Cache-Control: no-store, no-cache, must-revalidate, proxy-revalidate' and 'Pragma: no-cache' on all sensitive routes. Conduct penetration testing and code reviews to verify that no other endpoints inadvertently expose sensitive data via caching. For organizations using custom or third-party CDNs, enforce policies that prevent caching of authenticated content. Additionally, monitor access logs and CDN cache hit/miss ratios for anomalies that could indicate token leakage. Educate development teams on secure caching practices and the risks of caching sensitive information. Finally, consider implementing short-lived session tokens and multi-factor authentication to reduce the impact of any potential token exposure.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-10T22:29:34.876Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691fc3ff70da09562fa7fca7
Added to database: 11/21/2025, 1:44:31 AM
Last enriched: 11/28/2025, 4:42:49 AM
Last updated: 1/7/2026, 4:19:09 AM
Views: 127
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.