Home

Description

Session tokens and passwords in couch-auth 0.21.2 are stored in JavaScript objects and remain in memory without explicit clearing in src/user.ts lines 700-707. This creates a window of opportunity for sensitive data extraction through memory dumps, debugging tools, or other memory access techniques, potentially leading to session hijacking.

PUBLISHED Reserved 2025-09-26 | Published 2025-11-20 | Updated 2025-11-20 | Assigner mitre

References

www.npmjs.com/package/@perfood/couch-auth

github.com/perfood/couch-auth

github.com/...ecurity-advisories/blob/main/CVE-2025-60794.md

cve.org (CVE-2025-60794)

nvd.nist.gov (CVE-2025-60794)

Download JSON