Vulnerabilities/

Payload's SQLite adapter Session Fixation vulnerability (GHSA-26rv-h2hf-3fw4)

Severity:
Medium

Description

A Session Fixation vulnerability existed in Payload’s SQLite adapter due to identifier reuse during account creation. A malicious attacker could create a new account, save its JSON Web Token (JWT), and then delete the account, which did not invalidate the JWT.

Recommendation

Update the @payloadcms/next package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
@payloadcms/next
Anything's wrong? Let us know Last updated on August 29, 2025

This issue is available in SmartScanner Professional

See Pricing