Description
A Session Fixation vulnerability existed in Payload’s SQLite adapter due to identifier reuse during account creation. A malicious attacker could create a new account, save its JSON Web Token (JWT), and then delete the account, which did not invalidate the JWT.
Recommendation
Update the @payloadcms/graphql
package to the latest compatible version. Followings are version details:
- Affected version(s): < 3.44.0
- Patched version(s): 3.44.0
References
Related Issues
- Regular Expression Denial of Service (ReDoS) in lodash - CVE-2020-28500
- Payload does not invalidate JWTs after log out - CVE-2025-4643
- Elliptic's verify function omits uniqueness validation - CVE-2024-48949
- secp256k1-node allows private key extraction over ECDH - CVE-2024-48930
- Tags:
- npm
- @payloadcms/graphql
Anything's wrong? Let us know Last updated on August 29, 2025