aio-libs aiohttp-session contains a Session Fixation vulnerability in load_session function for RedisStorage (see: https://github.com/aio-libs/aiohttp-session/blob/master/aiohttp_session/redis_storage.py#L42) that can result in Session Hijacking. This attack appear to be exploitable via Any method that allows setting session cookies (?session=<>, or meta tags or script tags with Set-Cookie).
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/aio-libs/aiohttp-session/blob/master/aiohttp_session/redis_storage.py#L60 | Third Party Advisory | 
| https://github.com/aio-libs/aiohttp-session/issues/272 | Exploit Third Party Advisory | 
| https://github.com/aio-libs/aiohttp-session/blob/master/aiohttp_session/redis_storage.py#L60 | Third Party Advisory | 
| https://github.com/aio-libs/aiohttp-session/issues/272 | Exploit Third Party Advisory | 
Configurations
                    History
                    11 Jul 2025, 20:06
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Aio-libs Aio-libs aiohttp Session | |
| CPE | cpe:2.3:a:aio-libs:aiohttp_session:*:*:*:*:*:*:*:* | 
21 Nov 2024, 03:40
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/aio-libs/aiohttp-session/blob/master/aiohttp_session/redis_storage.py#L60 - Third Party Advisory | |
| References | () https://github.com/aio-libs/aiohttp-session/issues/272 - Exploit, Third Party Advisory | 
Information
                Published : 2018-06-26 16:29
Updated : 2025-07-11 20:06
NVD link : CVE-2018-1000519
Mitre link : CVE-2018-1000519
CVE.ORG link : CVE-2018-1000519
JSON object : View
Products Affected
                aio-libs
- aiohttp_session
CWE
                
                    
                        
                        CWE-384
                        
            Session Fixation
