Critical Vulnerability Found in Auth0 SDK – Patch Released for PHP, Symfony, Laravel, and WordPress
A serious vulnerability has been discovered in the Auth0-PHP SDK, a popular authentication library provided by Okta. This flaw affects numerous platforms including Symfony, Laravel, and WordPress, putting millions of web applications at risk.
The identified flaw, tracked as CVE-2025-47275, is classified as Critical with a CVSS v3.1 score of 9.1. The vulnerability exists in the CookieStore session management implementation, where attackers could potentially bypass authentication via brute-force guessing of session cookie tags.
If your application uses Auth0’s SDK with CookieStore for session handling, it may be vulnerable to unauthorized access. Attackers could exploit weak validation mechanisms to impersonate users without valid credentials.
The following frameworks and their respective SDKs are impacted:
All of these rely on the same PHP base library that is vulnerable to CVE-2025-47275.
To mitigate the risk, Okta has released an updated version:
Auth0-PHP SDK 8.14.0
This version includes a critical fix that addresses the brute-force flaw by improving the security of session cookie validation.
Framework-specific patches have also been rolled out:
These updates align with the core patch and ensure secure integration across different PHP frameworks.
Okta recommends rotating your encryption keys used for session cookies as an added precaution. This ensures that any previous session data stored using vulnerable keys becomes invalid.
After applying the update, all existing session cookies created with older versions will be invalidated automatically.
By taking swift action, you can protect your applications from potential unauthorized access stemming from this critical vulnerability.
Auth0, now a part of Okta, is a flexible authentication and authorization platform trusted by companies worldwide. It offers secure identity management solutions for developers building modern applications.
Okta remains committed to rapid incident response and encourages users to follow secure development practices and subscribe to their security advisories for timely updates.