An insufficient session expiration vulnerability exists in the latest version of parisneo/lollms. The application fails to invalidate active sessions after a password reset, allowing an attacker to continue using an old session token. This issue arises due to the absence of logic to reject requests after a period of inactivity and the excessively long default session duration of 31 days. The vulnerability enables an attacker to maintain persistent access to a compromised account, even after the victim resets their password.
References
Configurations
No configuration.
History
08 Apr 2026, 03:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-08 03:16
Updated : 2026-04-08 21:26
NVD link : CVE-2026-1163
Mitre link : CVE-2026-1163
CVE.ORG link : CVE-2026-1163
JSON object : View
Products Affected
No product.
CWE
CWE-613
Insufficient Session Expiration
