First published: Sat May 17 2025(Updated: )
**Overview** Session cookies of applications using the laravel-auth0 SDK configured with CookieStore have authentication tags that can be brute forced, which may result in unauthorized access. **Am I Affected?** You are affected by this vulnerability if you meet the following pre-conditions: 1. Applications using laravel-auth0 SDK with version <=7.16.0 2. laravel-auth0 SDK uses the Auth0-PHP SDK with version 8.0.0-BETA1 or higher and below 8.14.0. 3. Session storage configured with CookieStore. **Fix** Upgrade Auth0/laravel-auth0 to v7.17.0. As an additional precautionary measure, we recommend rotating your cookie encryption keys. Note that once updated, any previous session cookies will be rejected. **Acknowledgement** Okta would like to thank Félix Charette for discovering this vulnerability.
Affected Software | Affected Version | How to fix |
---|---|---|
composer/auth0/login | <7.17.0 | 7.17.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
GHSA-9fwj-9mjf-rhj3 is a high severity vulnerability due to the potential for unauthorized access via brute-forced session cookies.
To fix GHSA-9fwj-9mjf-rhj3, upgrade the auth0/login package to version 7.17.0 or higher.
Any application utilizing the laravel-auth0 SDK configured with CookieStore and below version 7.17.0 is affected by GHSA-9fwj-9mjf-rhj3.
Failing to address GHSA-9fwj-9mjf-rhj3 can result in unauthorized access to user sessions and sensitive data.
There are no recommended workarounds for GHSA-9fwj-9mjf-rhj3; the only mitigation is to update to the fixed version.