Vulnerabilities (CVE)

Filtered by CWE-613
Total 484 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-25954 1 Dell 1 Powerscale Onefs 2026-02-20 N/A 5.3 MEDIUM
Dell PowerScale OneFS, versions 9.5.0.x through 9.7.0.x, contain an insufficient session expiration vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to denial of service.
CVE-2026-24894 1 Php 1 Frankenphp 2026-02-20 N/A 7.5 HIGH
FrankenPHP is a modern application server for PHP. Prior to 1.11.2, when running FrankenPHP in worker mode, the $_SESSION superglobal is not correctly reset between requests. This allows a subsequent request processed by the same worker to access the $_SESSION data of the previous request (potentially belonging to a different user) before session_start() is called. This vulnerability is fixed in 1.11.2.
CVE-2025-36377 1 Ibm 1 Qradar Edr 2026-02-20 N/A 6.3 MEDIUM
IBM Security QRadar EDR 3.12 through 3.12.23 does not invalidate session after a session expiration which could allow an authenticated user to impersonate another user on the system.
CVE-2026-1435 1 Graylog 1 Graylog 2026-02-18 N/A 9.8 CRITICAL
Not properly invalidated session vulnerability in Graylog Web Interface, version 2.2.3, due to incorrect management of session invalidation after new logins. The application generates a new 'sessionId' each time a user authenticates, but does not invalidate previously issued session identifiers, which remain valid even after multiple consecutive logins by the same user. As a result, a stolen or leaked 'sessionId' can continue to be used to authenticate valid requests. Exploiting this vulnerability would allow an attacker with access to the web service/API network (port 9000 or HTTP/S endpoint of the server) to reuse an old session token to gain unauthorized access to the application, interact with the API/web, and compromise the integrity of the affected account.
CVE-2025-63226 1 Sencore 6 Decoder-ccv2, Decoder-ccv2 Firmware, En2sdi-2hd and 3 more 2026-02-13 N/A 5.7 MEDIUM
The Sencore SMP100 SMP Media Platform (firmware versions V4.2.160, V60.1.4, V60.1.29) is vulnerable to session hijacking due to improper session management on the /UserManagement.html endpoint. Attackers who are on the same network as the victim and have access to the target's logged-in session can access the endpoint and add new users without any authentication. This allows attackers to gain unauthorized access to the system and perform malicious activities.
CVE-2025-55705 1 Evmapa 1 Evmapa 2026-02-12 N/A 7.3 HIGH
This vulnerability occurs when the system permits multiple simultaneous connections to the backend using the same charging station ID. This can result in unauthorized access, data inconsistency, or potential manipulation of charging sessions. The lack of proper session management and expiration control allows attackers to exploit this weakness by reusing valid charging station IDs to establish multiple sessions concurrently.
CVE-2026-24667 1 Gunet 1 Open Eclass Platform 2026-02-10 N/A 5.0 MEDIUM
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, failure to invalidate active user sessions after a password change allows existing session tokens to remain valid, potentially enabling unauthorized continued access to user accounts. This issue has been patched in version 4.2.
CVE-2026-24669 1 Gunet 1 Open Eclass Platform 2026-02-10 N/A 7.8 HIGH
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an insecure password reset mechanism allows local attackers to reuse a valid password reset token after it has already been used, enabling unauthorized password changes and potential account takeover. This issue has been patched in version 4.2.
CVE-2024-43181 1 Ibm 1 Concert 2026-02-05 N/A 6.3 MEDIUM
IBM Concert 1.0.0 through 2.1.0 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system.
CVE-2025-36063 1 Ibm 1 Sterling Connect\ 2026-02-05 N/A 6.3 MEDIUM
IBM Sterling Connect:Express Adapter for Sterling B2B Integrator 5.2.0 5.2.0.00 through 5.2.0.12 does not invalidate session after a logout which could allow an authenticated user to impersonate another user on the system.
CVE-2026-24472 1 Hono 1 Hono 2026-02-04 N/A 5.3 MEDIUM
Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.11.7, Cache Middleware contains an information disclosure vulnerability caused by improper handling of HTTP cache control directives. The middleware does not respect standard cache control headers such as `Cache-Control: private` or `Cache-Control: no-store`, which may result in private or authenticated responses being cached and subsequently exposed to unauthorized users. Version 4.11.7 has a patch for the issue.
CVE-2025-36065 1 Ibm 1 Sterling Connect\ 2026-02-03 N/A 6.3 MEDIUM
IBM Sterling Connect:Express Adapter for Sterling B2B Integrator 5.2.0 5.2.0.00 through 5.2.0.12 does not invalidate session after a browser closure which could allow an authenticated user to impersonate another user on the system.
CVE-2025-52661 1 Hcltech 1 Aion 2026-01-30 N/A 2.4 LOW
HCL AION version 2 is affected by a JWT Token Expiry Too Long vulnerability. This may increase the risk of token misuse, potentially resulting in unauthorized access if the token is compromised.
CVE-2025-65430 1 Allauth 1 Allauth 2026-01-20 N/A 5.4 MEDIUM
An issue was discovered in allauth-django before 65.13.0. IdP: marking a user as is_active=False after having handed tokens for that user while the account was still active had no effect. Fixed the access/refresh tokens are now rejected.
CVE-2022-50692 1 Sound4 17 Big Voice2, Big Voice2 Firmware, Big Voice4 and 14 more 2026-01-20 N/A 7.5 HIGH
SOUND4 IMPACT/FIRST/PULSE/Eco versions 2.x and below contain an insufficient session expiration vulnerability that allows attackers to reuse old session credentials. Attackers can exploit weak session management to potentially hijack active user sessions and gain unauthorized access to the application.
CVE-2025-62631 1 Fortinet 1 Fortios 2026-01-14 N/A 5.6 MEDIUM
An insufficient session expiration vulnerability [CWE-613] vulnerability in Fortinet FortiOS 7.4.0, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions allows attacker to maintain access to network resources via an active SSLVPN session not terminated after a user's password change under particular conditions outside of the attacker's control
CVE-2025-68954 1 Pterodactyl 2 Panel, Wings 2026-01-12 N/A 5.4 MEDIUM
Pterodactyl is a free, open-source game server management panel. Versions 1.11.11 and below do not revoke active SFTP connections when a user is removed from a server instance or has their permissions changes with respect to file access over SFTP. This allows a user that was already connected to SFTP to remain connected and access files even after their permissions are revoked. A user must have been connected to SFTP at the time of their permissions being revoked in order for this vulnerability to be exploited. This issue is fixed in version 1.12.0.
CVE-2025-31962 1 Hcltech 1 Bigfix Insights For Vulnerability Remediation 2026-01-12 N/A 2.0 LOW
Insufficient session expiration in the Web UI authentication component in HCL BigFix IVR version 4.2 allows an authenticated attacker to gain prolonged unauthorized access to protected API endpoints due to excessive expiration periods.
CVE-2024-27782 1 Fortinet 1 Fortiaiops 2026-01-09 N/A 8.1 HIGH
Multiple insufficient session expiration weaknesses [CWE-613] vulnerability in Fortinet FortiAIOps 2.0.0 may allow an attacker to re-use stolen old session tokens to perform unauthorized operations via crafted requests.
CVE-2025-62329 1 Hcltechsw 2 Hcl Devops Deploy, Hcl Launch 2026-01-07 N/A 5.0 MEDIUM
HCL DevOps Deploy / HCL Launch is susceptible to a race condition in http-session client-IP binding enforcement which may allow a session to be briefly reused from a new IP address before it is invalidated. This could lead to unauthorized access under certain network conditions.