icon

We found results for “

CVE-2025-4644

Good to know:

icon
icon

Date: August 29, 2025

A Session Fixation vulnerability existed in Payload's SQLite adapter due to identifier reuse during account creation. A malicious attacker could create a new account, save its JSON Web Token (JWT), and then delete the account, which did not invalidate the JWT. As a result, the next newly created user would receive the same identifier, allowing the attacker to reuse the JWT to authenticate and perform actions as that user. This issue has been fixed in version 3.44.0 of Payload.

Severity Score

Severity Score

Weakness Type (CWE)

Session Fixation

CWE-384

Top Fix

icon

Upgrade Version

Upgrade to version payload - 3.44.0;@payloadcms/next - 3.44.0;@payloadcms/graphql - 3.44.0

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): REQUIRED
Scope (S): UNCHANGED
Confidentiality (C): LOW
Integrity (I): LOW
Availability (A): NONE

Do you need more information?

Contact Us