7.1 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): LOW
- Availability impact (A): NONE
listmonk: Active sessions remain valid after password reset and password change
listmonk is a standalone, self-hosted, newsletter and mailing list manager. From version 4.1.0 to before version 6.1.0, a session management vulnerability allows previously issued authenticated sessions to remain valid after sensitive account security changes, specifically password reset and password change. As a result, an attacker who has already obtained a valid session cookie can retain access to the account even after the victim changes or resets their password. This weakens account recovery and session security guarantees. This issue has been patched in version 6.1.0.
References
-
https://github.com/knadh/listmonk/security/advisories/GHSA-h5j9-cvrw-v5qh x_refsource_CONFIRM
-
https://github.com/knadh/listmonk/releases/tag/v6.1.0 x_refsource_MISC
Affected products
- ==>= 4.1.0, < 6.1.0
Package maintainers
-
@RaitoBezarius Ryan Lahfa <ryan@lahfa.xyz>