CVE-2025-48947
JavaScript vulnerability analysis and mitigation

Overview

The Auth0 Next.js SDK, a library for implementing user authentication in Next.js applications, contains a vulnerability tracked as CVE-2025-48947. The flaw affects versions 4.0.1 through 4.6.0, where __session cookies set by auth0.middleware may be cached by CDNs due to missing Cache-Control headers. With over 286,000 weekly downloads, this vulnerability has significant reach across the Next.js developer ecosystem (Security Online).

Technical details

The vulnerability is rated with a CVSS score of 7.7 (High) and requires three specific preconditions to be exploitable: using the NextJS-Auth0 SDK between versions 4.0.1 and 4.6.0, having an application served through a CDN or edge network that caches Set-Cookie headers, and missing proper Cache-Control settings for sensitive responses (GitHub Advisory).

Impact

The vulnerability could allow cached session cookies to be mistakenly served to multiple users under certain conditions, violating session integrity and potentially allowing unauthorized access to user accounts (Security Online).

Mitigation and workarounds

Users should upgrade to version 4.6.1 of @auth0/nextjs-auth0 immediately to receive the security patch (Security Online).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management