GHSA-862m-5253-832r: Auth0 Wordpress Plugin vulnerable to Deserialization of Untrusted Data
Overview The Auth0 Wordpress plugin contains a critical vulnerability due to insecure deserialization of cookie data. If exploited, since SDKs process cookie content without prior authentication, a threat actor could send a specially crafted cookie containing malicious serialized data.
Am I Affected? You are affected by this vulnerability if you meet the following preconditions:
- Applications using the Auth0 WordPress plugin, versions between 5.0.0 BETA-0 to 5.0.1.
- Auth0 WordPress plugin uses the Auth0-PHP SDK with version 8.0.0-BETA3 to 8.3.0.
Fix Upgrade the Auth0 WordPress plugin to the latest version (v5.3.0).
References
- github.com/advisories/GHSA-862m-5253-832r
- github.com/auth0/auth0-PHP/security/advisories/GHSA-v9m8-9xxp-q492
- github.com/auth0/laravel-auth0/security/advisories/GHSA-c42h-56wx-h85q
- github.com/auth0/symfony/security/advisories/GHSA-98j6-67v3-mw34
- github.com/auth0/wordpress
- github.com/auth0/wordpress/security/advisories/GHSA-862m-5253-832r
- nvd.nist.gov/vuln/detail/CVE-2025-48951
Code Behaviors & Features
Detect and mitigate GHSA-862m-5253-832r with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →