Payload's SQLite adapter Session Fixation vulnerability (GHSA-26rv-h2hf-3fw4)
- Severity:
- Medium
Description
A Session Fixation vulnerability existed in Payload’s SQLite adapter due to identifier reuse during account creation. A malicious attacker could create a new account, save its JSON Web Token (JWT), and then delete the account, which did not invalidate the JWT.
Recommendation
Update the @payloadcms/next package to the latest compatible version. Followings are version details:
- Affected version(s): < 3.44.0
- Patched version(s): 3.44.0
References
Related Issues
- Sentry's sensitive headers are leaked when `sendDefaultPii` is set to `true` - CVE-2025-65944
- Regular Expression Denial of Service (ReDoS) in lodash (GHSA-29mw-wpgm-hmr9) - CVE-2020-28500
- Server-Side Request Forgery via /_image endpoint in Astro Cloudflare adapter - CVE-2025-58179
- CKEditor 5 cross-site scripting (XSS) vulnerability in the clipboard package - CVE-2025-58064
- Tags:
- npm
- @payloadcms/next
Anything's wrong? Let us know Last updated on August 29, 2025