Vulnerability Description
A Session Fixation vulnerability existed in Payload's SQLite adapter due to identifier reuse during account creation. A malicious attacker could create a new account, save its JSON Web Token (JWT), and then delete the account, which did not invalidate the JWT. As a result, the next newly created user would receive the same identifier, allowing the attacker to reuse the JWT to authenticate and perform actions as that user. This issue has been fixed in version 3.44.0 of Payload.
Related Weaknesses (CWE)
References
- https://cert.pl/en/posts/2025/08/CVE-2025-4643
- https://github.com/payloadcms/payload
- https://payloadcms.com
FAQ
What is CVE-2025-4644?
CVE-2025-4644 is a documented vulnerability. A Session Fixation vulnerability existed in Payload's SQLite adapter due to identifier reuse during account creation. A malicious attacker could create a new account, save its JSON Web Token (JWT), an...
How severe is CVE-2025-4644?
CVSS scoring is not yet available for CVE-2025-4644. Check NVD for updates.
Is there a patch for CVE-2025-4644?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.