
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
The Auth0 Next.js SDK, a library for implementing user authentication in Next.js applications, contains a vulnerability tracked as CVE-2025-48947. The flaw affects versions 4.0.1 through 4.6.0, where __session
cookies set by auth0.middleware may be cached by CDNs due to missing Cache-Control headers. With over 286,000 weekly downloads, this vulnerability has significant reach across the Next.js developer ecosystem (Security Online).
The vulnerability is rated with a CVSS score of 7.7 (High) and requires three specific preconditions to be exploitable: using the NextJS-Auth0 SDK between versions 4.0.1 and 4.6.0, having an application served through a CDN or edge network that caches Set-Cookie headers, and missing proper Cache-Control settings for sensitive responses (GitHub Advisory).
The vulnerability could allow cached session cookies to be mistakenly served to multiple users under certain conditions, violating session integrity and potentially allowing unauthorized access to user accounts (Security Online).
Users should upgrade to version 4.6.1 of @auth0/nextjs-auth0 immediately to receive the security patch (Security Online).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”