{"uuid": "c2476240-f920-40f4-ba0a-8f71c1c098a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46344", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13926", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46344\n\ud83d\udd25 CVSS Score: 4.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U)\n\ud83d\udd39 Description: The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. Versions starting from 4.0.1 and prior to 4.5.1, do not invoke `.setExpirationTime` when generating a JWE token for the session. As a result, the JWE does not contain an internal expiration claim. While the session cookie may expire or be cleared, the JWE remains valid. This issue has been patched in version 4.5.1.\n\ud83d\udccf Published: 2025-04-29T20:43:41.538Z\n\ud83d\udccf Modified: 2025-04-29T20:43:41.538Z\n\ud83d\udd17 References:\n1. https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-pjr6-jx7r-j4r6\n2. https://github.com/auth0/nextjs-auth0/commit/a4f061aed02ffa132feca8adfbd11704df17e1c3\n3. https://github.com/auth0/nextjs-auth0/releases/tag/v4.5.1", "creation_timestamp": "2025-04-29T21:13:27.000000Z"}