Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64762: CWE-524: Use of Cache Containing Sensitive Information in workos authkit-nextjs

0
High
VulnerabilityCVE-2025-64762cvecve-2025-64762cwe-524
Published: Fri Nov 21 2025 (11/21/2025, 01:29:22 UTC)
Source: CVE Database V5
Vendor/Project: workos
Product: authkit-nextjs

Description

The AuthKit library for Next.js provides convenient helpers for authentication and session management using WorkOS & AuthKit with Next.js. In authkit-nextjs version 2.11.0 and below, authenticated responses do not defensively apply anti-caching headers. In environments where CDN caching is enabled, this can result in session tokens being included in cached responses and subsequently served to multiple users. Next.js applications deployed on Vercel are unaffected unless they manually enable CDN caching by setting cache headers on authenticated paths. Patched in authkit-nextjs 2.11.1, which applies anti-caching headers to all responses behind authentication.

AI-Powered Analysis

AILast updated: 11/21/2025, 01:59:28 UTC

Technical Analysis

The vulnerability identified as CVE-2025-64762 affects the authkit-nextjs library, a tool designed to facilitate authentication and session management in Next.js applications using WorkOS. Versions prior to 2.11.1 fail to apply anti-caching headers on authenticated HTTP responses. In environments where CDN caching is enabled for these responses, session tokens embedded in the responses can be cached and subsequently served to multiple users, violating confidentiality and session integrity. This is classified under CWE-524, which concerns the use of caches containing sensitive information. The vulnerability is exploitable remotely without authentication or user interaction, as indicated by the CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N). The impact on confidentiality and integrity is high, as session tokens can be leaked to unauthorized parties, potentially allowing session hijacking and unauthorized access to user accounts. The vulnerability does not affect Next.js applications deployed on Vercel by default, as Vercel does not enable CDN caching on authenticated paths unless explicitly configured. The patch released in version 2.11.1 mitigates the issue by enforcing anti-caching headers on all authenticated responses, preventing CDNs from caching sensitive session data. No known exploits have been reported in the wild, but the high CVSS score reflects the critical nature of the risk if exploited.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of user sessions in web applications using authkit-nextjs versions below 2.11.1 with CDN caching enabled. If exploited, attackers could gain unauthorized access to user accounts by retrieving cached session tokens from CDN caches. This can lead to data breaches, unauthorized transactions, and compromise of sensitive personal or corporate information. Organizations in sectors with strict data protection regulations such as GDPR (e.g., finance, healthcare, government) face heightened compliance risks and potential legal penalties if session data is leaked. The risk is amplified in multi-tenant or shared CDN environments where cached responses might be served to unintended users. Additionally, the breach of session tokens can undermine user trust and damage organizational reputation. The vulnerability's ease of exploitation without authentication or user interaction increases the urgency for mitigation. However, organizations using Vercel's default deployment are less likely to be affected unless they explicitly enable CDN caching on authenticated routes.

Mitigation Recommendations

European organizations should immediately upgrade authkit-nextjs to version 2.11.1 or later to ensure anti-caching headers are applied to all authenticated responses. For environments where upgrading is not immediately feasible, organizations should audit CDN configurations to ensure caching is disabled on any authenticated or session-sensitive endpoints. This includes setting appropriate Cache-Control headers such as 'no-store', 'no-cache', 'private', and 'must-revalidate' to prevent caching of sensitive data. Implement strict Content Security Policies and monitor CDN cache behavior regularly to detect any inadvertent caching of sensitive information. Additionally, review and restrict CDN edge caching rules to exclude authenticated paths. Conduct security testing to verify that session tokens are not exposed in cached responses. Educate development teams about secure caching practices and the risks of caching authenticated content. For organizations using Vercel, verify that no manual cache headers are set on authenticated routes. Finally, implement robust session management practices, including short session lifetimes and token revocation mechanisms, to limit the impact of any potential token leakage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-10T22:29:34.876Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691fc3ff70da09562fa7fca7

Added to database: 11/21/2025, 1:44:31 AM

Last enriched: 11/21/2025, 1:59:28 AM

Last updated: 11/21/2025, 3:05:00 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats