Session tokens and passwords in couch-auth 0.21.2 are stored in JavaScript objects and remain in memory without explicit clearing in src/user.ts lines 700-707. This creates a window of opportunity for sensitive data extraction through memory dumps, debugging tools, or other memory access techniques, potentially leading to session hijacking.
References
Configurations
No configuration.
History
20 Nov 2025, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-316 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
20 Nov 2025, 15:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-20 15:17
Updated : 2025-11-21 15:13
NVD link : CVE-2025-60794
Mitre link : CVE-2025-60794
CVE.ORG link : CVE-2025-60794
JSON object : View
Products Affected
No product.
CWE
CWE-316
Cleartext Storage of Sensitive Information in Memory
