First published: Tue Apr 29 2025(Updated: )
### Overview Auth0 NextJS `v4.0.1` to `v4.5.0` does not invoke `.setExpirationTime` when generating a JWE token for the session. As a result, the JWE does not contain an internal expiration claim. While the session cookie may expire or be cleared, the JWE remains valid. ### Am I Affected? You are affected if you are using Auth0 NextJS SDK v4. ### Fix Upgrade to `v4.5.1`.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/@auth0/nextjs-auth0 | >=4.0.1<4.5.1 | 4.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-46344 is classified as a moderate severity vulnerability due to potential session-related issues.
To fix CVE-2025-46344, upgrade the @auth0/nextjs-auth0 package to version 4.5.1 or later.
CVE-2025-46344 affects versions from 4.0.1 to 4.5.0 of the @auth0/nextjs-auth0 package.
The consequence of CVE-2025-46344 is that a JWE token may remain valid indefinitely, leading to potential unauthorized access if not updated.
There is no specific workaround documented for CVE-2025-46344, and upgrading is the recommended solution.