Vendure is an open-source headless commerce platform. Prior to version 3.5.3, the `NativeAuthenticationStrategy.authenticate()` method is vulnerable to a timing attack that allows attackers to enumerate valid usernames (email addresses). In `packages/core/src/config/auth/native-authentication-strategy.ts`, the authenticate method returns immediately if a user is not found. The significant timing difference (~200-400ms for bcrypt vs ~1-5ms for DB miss) allows attackers to reliably distinguish between existing and non-existing accounts. Version 3.5.3 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/vendurehq/vendure/releases/tag/v3.5.3 | Product Release Notes |
| https://github.com/vendurehq/vendure/security/advisories/GHSA-6f65-4fv2-wwch | Mitigation Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-01-30 16:16
Updated : 2026-02-26 21:59
NVD link : CVE-2026-25050
Mitre link : CVE-2026-25050
CVE.ORG link : CVE-2026-25050
JSON object : View
Products Affected
vendure
- vendure
CWE
CWE-202
Exposure of Sensitive Information Through Data Queries
