CVE-2025-47275

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to brute-force authentication tags in session cookies of applications using Auth0-PHP SDK with CookieStore configuration, potentially leading to unauthorized access. It affects applications using Auth0-PHP SDK versions 8.0.0-BETA1 through 8.13.x, including those built with Auth0/symfony, Auth0/laravel-auth0, and Auth0/wordpress SDKs that rely on Auth0-PHP.

💻 Affected Systems

Products:
  • Auth0-PHP SDK
  • Auth0/symfony
  • Auth0/laravel-auth0
  • Auth0/wordpress
Versions: 8.0.0-BETA1 through 8.13.x
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when using CookieStore for session storage; other session storage methods are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized administrative access to applications, leading to complete system compromise, data theft, or account takeover.

🟠

Likely Case

Attackers gain unauthorized user-level access to applications, potentially accessing sensitive user data or performing unauthorized actions.

🟢

If Mitigated

Attackers cannot brute-force cookies due to proper key rotation and patching, maintaining normal authentication security.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires brute-forcing authentication tags, which is computationally intensive but feasible with sufficient resources.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.14.0

Vendor Advisory: https://github.com/auth0/auth0-PHP/security/advisories/GHSA-g98g-r7gf-2r25

Restart Required: Yes

Instructions:

1. Update Auth0-PHP to version 8.14.0 via composer update auth0/auth0-php. 2. Rotate cookie encryption keys. 3. Restart application services. 4. Test authentication functionality.

🔧 Temporary Workarounds

Switch to alternative session storage

all

Change session storage from CookieStore to a more secure backend like database or Redis storage.

Modify application configuration to use a different session store (e.g., database, Redis) instead of CookieStore.

🧯 If You Can't Patch

  • Implement rate limiting on authentication endpoints to hinder brute-force attempts.
  • Deploy WAF rules to detect and block suspicious cookie manipulation patterns.

🔍 How to Verify

Check if Vulnerable:

Check composer.json or installed packages for Auth0-PHP version 8.0.0-BETA1 to 8.13.x and verify CookieStore is configured in session settings.

Check Version:

composer show auth0/auth0-php | grep versions

Verify Fix Applied:

Confirm Auth0-PHP version is 8.14.0 or higher via composer show auth0/auth0-php and test that old session cookies are rejected.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts with manipulated cookies
  • Unexpected session validation errors

Network Indicators:

  • High volume of requests to authentication endpoints with varying cookie values

SIEM Query:

source="application_logs" AND (message="*authentication tag*" OR message="*cookie validation*" OR message="*session invalid*")

🔗 References

📤 Share & Export