VYPR
Critical severity9.1NVD Advisory· Published May 15, 2025· Updated Apr 15, 2026

CVE-2025-47275

CVE-2025-47275

Description

Auth0-PHP provides the PHP SDK for Auth0 Authentication and Management APIs. Starting in version 8.0.0-BETA1 and prior to version 8.14.0, session cookies of applications using the Auth0-PHP SDK configured with CookieStore have authentication tags that can be brute forced, which may result in unauthorized access. Certain pre-conditions are required to be vulnerable to this issue: Applications using the Auth0-PHP SDK, or the Auth0/symfony, Auth0/laravel-auth0, and Auth0/wordpress SDKs that rely on the Auth0-PHP SDK; and session storage configured with CookieStore. Upgrade Auth0/Auth0-PHP to v8.14.0 to receive a patch. As an additional precautionary measure, rotating cookie encryption keys is recommended. Note that once updated, any previous session cookies will be rejected.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
auth0/auth0-phpPackagist
>= 8.0.0-BETA1, < 8.14.08.14.0

Patches

2
52a79480fdb2

Merge commit from fork

https://github.com/auth0/auth0-PHPkelvinzhu-oktaMay 15, 2025via ghsa
1 file changed · +7 1
  • src/Store/CookieStore.php+7 1 modified
    @@ -13,6 +13,7 @@
     use function is_array;
     use function is_int;
     use function is_string;
    +use function strlen;
     
     /**
      * This class provides a layer to persist transient auth data using cookies.
    @@ -39,6 +40,11 @@ final class CookieStore implements StoreInterface
          */
         public const VAL_CRYPTO_ALGO = 'aes-128-gcm';
     
    +    /**
    +     * @var int
    +     */
    +    public const VAL_CRYPTO_TAG_LENGTH_BYTES = 16;
    +
         /**
          * When true, CookieStore will not setState() itself. You will need manually call the method to persist state to storage.
          */
    @@ -123,7 +129,7 @@ public function decrypt(
             $iv = base64_decode($data['iv'], true);
             $tag = base64_decode($data['tag'], true);
     
    -        if (! is_string($iv) || ! is_string($tag)) {
    +        if (! is_string($iv) || ! is_string($tag) || self::VAL_CRYPTO_TAG_LENGTH_BYTES !== strlen($tag)) {
                 return null;
             }
     
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.