Payload's SQLite adapter Session Fixation vulnerability (GHSA-26rv-h2hf-3fw4)
- Severity:
- Medium
Description
A Session Fixation vulnerability existed in Payload’s SQLite adapter due to identifier reuse during account creation. A malicious attacker could create a new account, save its JSON Web Token (JWT), and then delete the account, which did not invalidate the JWT.
Recommendation
Update the @payloadcms/next
package to the latest compatible version. Followings are version details:
- Affected version(s): < 3.44.0
- Patched version(s): 3.44.0
References
Related Issues
- Regular Expression Denial of Service (ReDoS) in lodash (GHSA-29mw-wpgm-hmr9) - CVE-2020-28500
- CKEditor 5 cross-site scripting (XSS) vulnerability in the clipboard package - CVE-2025-58064
- Payload does not invalidate JWTs after log out (GHSA-5v66-m237-hwf7) - CVE-2025-4643
- http-proxy-middleware can call writeBody twice because "else if" is not used - CVE-2025-32996
- Tags:
- npm
- @payloadcms/next
Anything's wrong? Let us know Last updated on August 29, 2025