Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. auth0/wordpress
  4. ›
  5. GHSA-862m-5253-832r

GHSA-862m-5253-832r: Auth0 Wordpress Plugin vulnerable to Deserialization of Untrusted Data

June 5, 2025

Overview The Auth0 Wordpress plugin contains a critical vulnerability due to insecure deserialization of cookie data. If exploited, since SDKs process cookie content without prior authentication, a threat actor could send a specially crafted cookie containing malicious serialized data.

Am I Affected? You are affected by this vulnerability if you meet the following preconditions:

  1. Applications using the Auth0 WordPress plugin, versions between 5.0.0 BETA-0 to 5.0.1.
  2. Auth0 WordPress plugin uses the Auth0-PHP SDK with version 8.0.0-BETA3 to 8.3.0.

Fix Upgrade the Auth0 WordPress plugin to the latest version (v5.3.0).

References

  • github.com/advisories/GHSA-862m-5253-832r
  • github.com/auth0/auth0-PHP/security/advisories/GHSA-v9m8-9xxp-q492
  • github.com/auth0/laravel-auth0/security/advisories/GHSA-c42h-56wx-h85q
  • github.com/auth0/symfony/security/advisories/GHSA-98j6-67v3-mw34
  • github.com/auth0/wordpress
  • github.com/auth0/wordpress/security/advisories/GHSA-862m-5253-832r
  • nvd.nist.gov/vuln/detail/CVE-2025-48951

Code Behaviors & Features

Detect and mitigate GHSA-862m-5253-832r with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 5.0.0-BETA0 before 5.1.0

Fixed versions

  • 5.1.0

Solution

Upgrade to version 5.1.0 or above.

Weakness

  • CWE-502: Deserialization of Untrusted Data

Source file

packagist/auth0/wordpress/GHSA-862m-5253-832r.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:19:36 +0000.