Insufficient Session Expiration Affecting @auth0/nextjs-auth0 package, versions >=4.0.1 <4.5.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (24th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Insufficient Session Expiration vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-AUTH0NEXTJSAUTH0-9905138
  • published30 Apr 2025
  • disclosed29 Apr 2025
  • creditUnknown

Introduced: 29 Apr 2025

NewCVE-2025-46344  (opens in a new tab)
CWE-613  (opens in a new tab)

How to fix?

Upgrade @auth0/nextjs-auth0 to version 4.5.1 or higher.

Overview

@auth0/nextjs-auth0 is a Next.js SDK for signing in with Auth0

Affected versions of this package are vulnerable to Insufficient Session Expiration due to not invoking .setExpirationTime when generating a JWE token for the session. An attacker can maintain access using the JWE token even after the session cookie has expired or been cleared by exploiting this vulnerability.

CVSS Base Scores

version 4.0
version 3.1