
We found results for “”
CVE-2025-4644
Good to know:


Date: August 29, 2025
A Session Fixation vulnerability existed in Payload's SQLite adapter due to identifier reuse during account creation. A malicious attacker could create a new account, save its JSON Web Token (JWT), and then delete the account, which did not invalidate the JWT. As a result, the next newly created user would receive the same identifier, allowing the attacker to reuse the JWT to authenticate and perform actions as that user. This issue has been fixed in version 3.44.0 of Payload.
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Session Fixation
CWE-384Top Fix

Upgrade Version
Upgrade to version payload - 3.44.0;@payloadcms/next - 3.44.0;@payloadcms/graphql - 3.44.0
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | REQUIRED |
Scope (S): | UNCHANGED |
Confidentiality (C): | LOW |
Integrity (I): | LOW |
Availability (A): | NONE |