Session tokens and passwords in couch-auth 0.21.2 are stored in JavaScript objects and remain in memory without explicit clearing in src/user.ts lines 700-707. This creates a window of opportunity for sensitive data extraction through memory dumps, debugging tools, or other memory access techniques, potentially leading to session hijacking.
{
"github_reviewed": true,
"github_reviewed_at": "2025-11-20T18:48:26Z",
"severity": "MODERATE",
"nvd_published_at": "2025-11-20T15:17:37Z",
"cwe_ids": [
"CWE-316"
]
}