VYPR

Couch Auth

by @perfood

Source repositories

CVEs (4)

  • CVE-2025-70948CriMar 5, 2026
    risk 0.60cvss 9.3epss 0.00

    A host header injection vulnerability in the mailer component of @perfood/couch-auth v0.26.0 allows attackers to obtain reset tokens and execute an account takeover via spoofing the HTTP Host header.

  • CVE-2025-70949HigMar 5, 2026
    risk 0.49cvss 7.5epss 0.00

    An observable timing discrepancy in @perfood/couch-auth v0.26.0 allows attackers to access sensitive information via a timing side-channel.

  • CVE-2024-57177HigFeb 10, 2025
    risk 0.47cvss 7.3epss 0.00

    A host header injection vulnerability exists in the NPM package of perfood/couch-auth <= 0.21.2. By sending a specially crafted host header in the email change confirmation request, it is possible to trigger a SSTI which can be leveraged to run limited commands or leak server-side information

  • CVE-2025-60794Nov 20, 2025
    risk 0.00cvss epss 0.00

    Session tokens and passwords in couch-auth 0.21.2 are stored in JavaScript objects and remain in memory without explicit clearing in src/user.ts lines 700-707. This creates a window of opportunity for sensitive data extraction through memory dumps, debugging tools, or other memory access techniques, potentially leading to session hijacking.