GHSA-9wg9-93h9-j8ch

Suggest an improvement
Source
https://github.com/advisories/GHSA-9wg9-93h9-j8ch
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/05/GHSA-9wg9-93h9-j8ch/GHSA-9wg9-93h9-j8ch.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-9wg9-93h9-j8ch
Related
Published
2025-05-17T15:06:54Z
Modified
2025-05-17T15:34:50.182923Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Auth0 Symfony SDK Vulnerable to Brute Force Authentication Tags of CookieStore Sessions
Details

Overview Session cookies of applications using the Auth0 symfony SDK configured with CookieStore have authentication tags that can be brute forced, which may result in unauthorized access.

Am I Affected? You are affected by this vulnerability if you meet the following pre-conditions: 1. Applications using the Auth0 symfony SDK with version <=5.3.1 2. Auth0/Symfony SDK uses the Auth0-PHP SDK with version 8.0.0-BETA1 or higher and below 8.14.0. 3. Session storage configured with CookieStore.

Fix Upgrade Auth0/symfony to v5.4.0. As an additional precautionary measure, we recommend rotating your cookie encryption keys. Note that once updated, any previous session cookies will be rejected.

Acknowledgement Okta would like to thank Félix Charette for discovering this vulnerability.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-287"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2025-05-17T15:06:54Z"
}
References

Affected packages

Packagist / auth0/symfony

Package

Name
auth0/symfony
Purl
pkg:composer/auth0/symfony

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.0

Affected versions

0.*

0.0.1
0.0.2
0.0.3

1.*

1.0.0
1.2.0
1.2.1
1.2.2
1.2.3
1.2.4
1.2.5
1.2.6
1.2.7
1.2.8
1.2.9
1.2.10

2.*

2.0.0
2.0.1
2.0.2
2.0.3

3.*

3.0.0-beta.1
3.0.0-beta.2
3.0.0-beta.3
3.0.0-beta.4
3.0.0-beta.5
3.0.0-rc.1
3.0.0
3.0.1
3.0.2
3.1.0
3.2.0
3.3.0
3.3.1
3.4.0

4.*

4.0.0

5.*

5.0.0-BETA0
5.0.0-BETA1
5.0.0
5.1.0
5.2.0
5.2.1
5.2.2
5.2.3
5.3.0