Description
Auth0-PHP is a PHP SDK for Auth0 Authentication and Management APIs. From version 8.0.0 to before version 8.19.0, in applications built with the Auth0 PHP SDK, cookies are encrypted with insufficient entropy, which may result in threat actors brute-forcing the encryption key and forging session cookies. This issue has been patched in version 8.19.0.
Published: 2026-04-01
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Session hijacking via forged cookies
Action: Immediate patch
AI Analysis

Impact

The vulnerability resides in Auth0 PHP SDK versions 8.0.0 up to 8.18.x where the cookies used for session tracking are encrypted with a key that lacks sufficient entropy. This weakness permits an attacker to launch a brute‑force attack on the encryption key, which in turn enables the attacker to forge valid session cookies. With a forged cookie the attacker can impersonate a legitimate user, gaining full authentication privileges and potentially accessing sensitive data.

Affected Systems

Affected applications are those that incorporate Auth0’s PHP SDK, specifically Auth0‑PHP from version 8.0.0 through 8.18.x. The vulnerability is tied to the auth0:auth0-PHP product family and impacts any PHP‑based web service that relies on the SDK for authentication or session management.

Risk and Exploitability

The CVSS score of 8.2 indicates high severity, while the EPSS score of less than 1% suggests a low probability of widespread exploitation at the moment. Because the weakness involves cryptographic key entropy, an attacker needs to execute a brute‑force attack against the encryption key; however, once the key is recovered, forging a session cookie is straightforward. The absence of a CISA KEV listing and the specific nature of the flaw point to a targeted rather than mass exploitation scenario.

Generated by OpenCVE AI on April 7, 2026 at 21:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Auth0 PHP SDK to version 8.19.0 or later, which includes a fix for the key‑entropy issue.
  • Verify that your deployment is using the patched version and that session cookies are encrypted with a sufficiently robust key.

Generated by OpenCVE AI on April 7, 2026 at 21:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-w3wc-44p4-m4j7 Auth0 PHP SDK has Insufficient Entropy in Cookie Encryption
History

Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:auth0:auth0-php:*:*:*:*:*:*:*:*

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Auth0
Auth0 auth0-php
Vendors & Products Auth0
Auth0 auth0-php

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Auth0-PHP is a PHP SDK for Auth0 Authentication and Management APIs. From version 8.0.0 to before version 8.19.0, in applications built with the Auth0 PHP SDK, cookies are encrypted with insufficient entropy, which may result in threat actors brute-forcing the encryption key and forging session cookies. This issue has been patched in version 8.19.0.
Title Auth0 PHP SDK Insufficient Entropy in Cookie Encryption
Weaknesses CWE-331
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-01T17:59:59.001Z

Reserved: 2026-03-26T16:22:29.034Z

Link: CVE-2026-34236

cve-icon Vulnrichment

Updated: 2026-04-01T17:59:53.927Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T18:16:30.007

Modified: 2026-04-07T20:20:35.920

Link: CVE-2026-34236

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:57:03Z

Weaknesses