Headline
GHSA-vqvc-9q8x-vmq6: The AuthKit React Router Library rendered sensitive auth data in HTML
In versions before 0.7.0
, @workos-inc/authkit-react-router
exposed sensitive authentication artifacts — specifically sealedSession
and accessToken
by returning them from the authkitLoader
. This caused them to be rendered into the browser HTML.
Impact
This information disclosure could lead to session hijacking in environments where cross-site scripting (XSS), malicious browser extensions, or local inspection is possible.
Patches
Patched in https://github.com/workos/authkit-react-router/releases/tag/v0.7.0
In patched versions:
sealedSession
andaccessToken
are no longer returned by default from theauthkitLoader
.- A secure server-side mechanism is provided to fetch an access token as needed.
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2025-55008
The AuthKit React Router Library rendered sensitive auth data in HTML
Package
npm @workos-inc/authkit-react-router (npm)
Affected versions
< 0.7.0
In versions before 0.7.0, @workos-inc/authkit-react-router exposed sensitive authentication artifacts — specifically sealedSession and accessToken by returning them from the authkitLoader. This caused them to be rendered into the browser HTML.
Impact
This information disclosure could lead to session hijacking in environments where cross-site scripting (XSS), malicious browser extensions, or local inspection is possible.
Patches
Patched in https://github.com/workos/authkit-react-router/releases/tag/v0.7.0
In patched versions:
- sealedSession and accessToken are no longer returned by default from the authkitLoader.
- A secure server-side mechanism is provided to fetch an access token as needed.
References
- GHSA-vqvc-9q8x-vmq6
- workos/authkit-react-router@607caac
Published to the GitHub Advisory Database
Aug 8, 2025