Vulnerabilities/

@perfood/couch-auth may expose session tokens, passwords

Severity:
Medium

Description

Session tokens and passwords in couch-auth 0.21.2 are stored in JavaScript objects and remain in memory without explicit clearing in src/user.ts lines 700-707. This creates a window of opportunity for sensitive data extraction through memory dumps, debugging tools, or other memory access techniques, potentially leading to session hijacking.

Recommendation

No fix is available yet. Followings are affected versions:

References

Related Issues

Tags:
npm
@perfood/couch-auth
Anything's wrong? Let us know Last updated on November 20, 2025