An authenticated user calling GET /users/me receives unsanitized auth data, including sensitive credentials such as MFA TOTP secrets and recovery codes. The endpoint internally uses master-level authentication for the session query, and the master context leaks through to the user data, bypassing auth adapter sanitization. An attacker who obtains a user's session token can extract MFA secrets to generate valid TOTP codes indefinitely.
The /users/me endpoint now queries the session and user data separately, using the caller's authentication context for the user query so that all security layers apply correctly.
There is no known workaround.
{
"github_reviewed": true,
"cwe_ids": [
"CWE-200"
],
"nvd_published_at": "2026-03-24T19:16:55Z",
"github_reviewed_at": "2026-03-24T20:17:02Z",
"severity": "HIGH"
}