Skip to content

Taylor has race condition in /get-patch that allows purchase token replay

Low severity GitHub Reviewed Published Jun 27, 2025 in tailot/taylored • Updated Jun 27, 2025

Package

npm taylored (npm)

Affected versions

<= 8.1.2

Patched versions

8.1.3

Description

Summary

The /get-patch endpoint processes a purchase in two separate database queries: a SELECT that verifies the token is unused, followed by an UPDATE that marks the token as used. Because SQLite only guards each statement, a malicious actor can issue two requests at the exact same moment and have both SELECT statements succeed before either UPDATE runs.

Details

The handler executes (step 1):

SELECT id, token_used_at FROM purchases WHERE patch_id = ? AND purchase_token = ? AND status = 'COMPLETED'

If token_used_at IS NULL, the request passes the check (step 2):

        if (row.token_used_at) {
            return res.status(403).json({ error: "Purchase token has already been used." });
        }

The handler finally runs (step 3):

UPDATE purchases SET token_used_at = CURRENT_TIMESTAMP WHERE id = ?

When two requests arrive at the same time, they both finish step 1 while the row is still unused. SQLite serializes writers only per statement, so each request believes it has exclusive access. Both decrypt and return the patch, and both UPDATE statements succeed.

PoC

Two perform this attack, you need to send two requests at the exact same time.

Impact

An attacker who possesses a valid purchase token can replay it and receive multiple copies of the paid patch, or distribute one copy while still keeping their own. This results in revenue loss and undermines license enforcement.

Remediation

Replace the read-then-write sequence with a single atomic statement that both validates and consumes the token while SQLite holds the write lock:

const row = db.prepare(`
  UPDATE purchases
     SET token_used_at = CURRENT_TIMESTAMP
   WHERE patch_id       = ?
     AND purchase_token = ?
     AND status         = 'COMPLETED'
     AND token_used_at IS NULL
  RETURNING id;
`).get(patchId, token);

if (!row) return res.status(403).json({ error: 'Invalid or already-used token.' });

References

@tailot tailot published to tailot/taylored Jun 27, 2025
Published to the GitHub Advisory Database Jun 27, 2025
Reviewed Jun 27, 2025
Last updated Jun 27, 2025

Severity

Low

EPSS score

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-vh5j-5fhq-9xwg

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.