Session tokens and passwords in couch-auth 0.21.2 are stored in JavaScript objects and remain in memory without explicit clearing in src/user.ts lines 700-707. This creates a window of opportunity for sensitive data extraction through memory dumps, debugging tools, or other memory access techniques, potentially leading to session hijacking.
References
| Link | Resource |
|---|---|
| https://github.com/perfood/couch-auth | Product |
| https://github.com/pr0wl1ng/security-advisories/blob/main/CVE-2025-60794.md | Third Party Advisory |
| https://www.npmjs.com/package/@perfood/couch-auth | Product |
Configurations
History
No history.
Information
Published : 2025-11-20 15:17
Updated : 2025-12-12 15:34
NVD link : CVE-2025-60794
Mitre link : CVE-2025-60794
CVE.ORG link : CVE-2025-60794
JSON object : View
Products Affected
perfood
- couchauth
CWE
CWE-316
Cleartext Storage of Sensitive Information in Memory
