GHSA-GHC5-95C2-VWCV: Insufficient Entropy in Cookie Encryption within Auth0 Symfony SDK
Vulnerability ID: GHSA-GHC5-95C2-VWCV
CVSS Score: 8.2
Published: 2026-04-03
The Auth0 Symfony SDK (versions 5.0.0 through 5.7.0) is vulnerable to an insufficient entropy flaw in its cookie encryption implementation, stemming from the underlying auth0/auth0-php library. This allows an attacker to brute-force session keys and forge valid authentication cookies.
TL;DR
Insufficient entropy in Auth0 Symfony SDK cookie encryption allows attackers to brute-force session keys and forge authentication cookies, leading to full account takeover.
⚠️ Exploit Status: POC
Technical Details
- Vulnerability ID: GHSA-GHC5-95C2-VWCV
- Mapped CVE: CVE-2026-34236
- CWE ID: CWE-331 (Insufficient Entropy)
- CVSS v3.1 Score: 8.2 (High)
- Attack Vector: Network
- Attack Complexity: High
- Primary Impact: Account Takeover via Session Forgery
Affected Systems
- Auth0 Symfony SDK (auth0/symfony)
- Auth0 PHP SDK (auth0/auth0-php)
- Symfony Applications implementing Auth0 session management
-
auth0/symfony: >= 5.0.0, <= 5.7.0 (Fixed in:
5.8.0) -
auth0/auth0-php: >= 8.0.0, < 8.19.0 (Fixed in:
8.19.0)
Mitigation Strategies
- Upgrade SDKs to secure versions
- Rotate cryptographic secrets
- Invalidate active sessions
Remediation Steps:
- Update composer.json to require 'auth0/symfony' version 5.8.0 or higher.
- Ensure the composer lock file enforces 'auth0/auth0-php' version 8.19.0 or higher.
- Deploy the updated dependencies to all environments.
- Generate a new, cryptographically secure random string to serve as the cookie encryption key.
- Update the application configuration with the new encryption key.
- Restart the application services to enforce the use of the new key and invalidate existing sessions.
References
- GitHub Advisory Database (GHSA-GHC5-95C2-VWCV)
- Auth0 Symfony SDK Repository
- Underlying SDK Advisory (GHSA-w3wc-44p4-m4j7)
- CVE Record
Read the full report for GHSA-GHC5-95C2-VWCV on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)