Auth0-PHP SDK has Improper Audience Validation
Description
Auth0-PHP is a PHP SDK for Auth0 Authentication and Management APIs. In applications built with the Auth0-PHP SDK, the audience validation in access tokens is performed improperly. Without proper validation, affected applications may accept ID tokens as Access tokens. Projects are affected if they use Auth0-PHP SDK versions between v8.0.0 and v8.17.0, or applications using the following SDKs that rely on the Auth0-PHP SDK versions between v8.0.0 and v8.17.0: Auth0/symfony versions between 5.0.0 and 5.5.0, Auth0/laravel-auth0 versions between 7.0.0 and 7.19.0, and/or Auth0/wordpress plugin versions between 5.0.0-BETA0 and 5.4.0. Auth0/Auth0-PHP version 8.18.0 contains a patch for the issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
auth0/auth0-phpPackagist | >= 8.0.0, < 8.18.0 | 8.18.0 |
Affected products
1Patches
4b207c6f7fd06fix(deps) : Update auth0/auth0-php for security fix
1 file changed · +1 −1
composer.json+1 −1 modified@@ -36,7 +36,7 @@ "php": "^8.1", "ext-json": "*", "ext-openssl": "*", - "auth0/auth0-php": "^8.17", + "auth0/auth0-php": "^8.18", "psr/cache": "^3.0" }, "require-dev": {
0103d6f8dceffix(deps) : Update auth0/auth0-php for security fix
1 file changed · +1 −1
composer.json+1 −1 modified@@ -32,7 +32,7 @@ "php": "^8.1", "ext-mbstring": "*", "ext-openssl": "*", - "auth0/auth0-php": "^8.17", + "auth0/auth0-php": "^8.18", "symfony/cache": "^6.4 || ^7.0", "symfony/framework-bundle": "^6.4 || ^7.0", "symfony/security-bundle": "^6.4 || ^7.0"
a1c3344dc0e5fix(deps) : Update auth0/auth0-php for security fix
1 file changed · +1 −1
composer.json+1 −1 modified@@ -37,7 +37,7 @@ "require": { "php": "^8.2", "ext-json": "*", - "auth0/auth0-php": "^8.17", + "auth0/auth0-php": "^8.18", "illuminate/contracts": "^11 || ^12", "illuminate/http": "^11 || ^12", "illuminate/support": "^11 || ^12",
7fe700053aeefix: prevent adding client ID to audience for non-access tokens
1 file changed · +3 −1
src/Token.php+3 −1 modified@@ -260,7 +260,9 @@ public function validate( $tokenOrganization ??= $this->configuration->getOrganization() ?? null; $tokenMaxAge ??= $this->configuration->getTokenMaxAge() ?? null; $tokenLeeway ??= $this->configuration->getTokenLeeway() ?? 60; - $tokenAudience[] = (string) $this->configuration->getClientId(); + if ($this->type !== self::TYPE_ACCESS_TOKEN) { + $tokenAudience[] = (string) $this->configuration->getClientId(); + } $tokenAudience = array_unique($tokenAudience); $validator = $this->getParser()->validate();
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
14- github.com/advisories/GHSA-j2vm-wrq3-f7gfghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-68129ghsaADVISORY
- github.com/auth0/auth0-PHP/commit/7fe700053aee609718460c123f00f53c511f0f7fghsax_refsource_MISCWEB
- github.com/auth0/auth0-PHP/releases/tag/8.18.0ghsax_refsource_MISCWEB
- github.com/auth0/auth0-PHP/security/advisories/GHSA-j2vm-wrq3-f7gfghsax_refsource_CONFIRMWEB
- github.com/auth0/laravel-auth0/commit/a1c3344dc0e5a36e8f56c8cfc535728d3d7558f3ghsax_refsource_MISCWEB
- github.com/auth0/laravel-auth0/releases/tag/7.20.0ghsax_refsource_MISCWEB
- github.com/auth0/laravel-auth0/security/advisories/GHSA-7hh9-gp72-wh7hghsax_refsource_MISCWEB
- github.com/auth0/symfony/commit/0103d6f8dcef6996653fad1f823d1c167f472479ghsax_refsource_MISCWEB
- github.com/auth0/symfony/releases/tag/5.6.0ghsax_refsource_MISCWEB
- github.com/auth0/symfony/security/advisories/GHSA-f3r2-88mq-9v4gghsax_refsource_MISCWEB
- github.com/auth0/wordpress/commit/b207c6f7fd06507b90c4e6bcc18a857ef9e018deghsax_refsource_MISCWEB
- github.com/auth0/wordpress/releases/tag/5.5.0ghsax_refsource_MISCWEB
- github.com/auth0/wordpress/security/advisories/GHSA-vvg7-8rmq-92g7ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.