GHSA-9fwj-9mjf-rhj3: laravel-auth0 SDK Vulnerable to Brute Force Authentication Tags of CookieStore Sessions
Overview Session cookies of applications using the laravel-auth0 SDK configured with CookieStore have authentication tags that can be brute forced, which may result in unauthorized access.
Am I Affected? You are affected by this vulnerability if you meet the following pre-conditions:
- Applications using laravel-auth0 SDK with version <=7.16.0
- laravel-auth0 SDK uses the Auth0-PHP SDK with version 8.0.0-BETA1 or higher and below 8.14.0.
- Session storage configured with CookieStore.
Fix Upgrade Auth0/laravel-auth0 to v7.17.0. As an additional precautionary measure, we recommend rotating your cookie encryption keys. Note that once updated, any previous session cookies will be rejected.
Acknowledgement Okta would like to thank Félix Charette for discovering this vulnerability.
References
- github.com/advisories/GHSA-9fwj-9mjf-rhj3
- github.com/auth0/laravel-auth0
- github.com/auth0/laravel-auth0/commit/be2c59adb476c49945dcc55741a54c7a68c1741d
- github.com/auth0/laravel-auth0/releases/tag/7.17.0
- github.com/auth0/laravel-auth0/security/advisories/GHSA-9fwj-9mjf-rhj3
- nvd.nist.gov/vuln/detail/CVE-2025-47275
Code Behaviors & Features
Detect and mitigate GHSA-9fwj-9mjf-rhj3 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →