Session Fixation Affecting github.com/goauthentik/authentik package, versions <2024.12.4>=2025.2.0-rc1 <2025.2.3


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMGOAUTHENTIKAUTHENTIK-9572086
  • published30 Mar 2025
  • disclosed28 Mar 2025
  • creditUnknown

Introduced: 28 Mar 2025

NewCVE-2025-29928  (opens in a new tab)
CWE-384  (opens in a new tab)

How to fix?

Upgrade github.com/goauthentik/authentik to version 2024.12.4, 2025.2.3 or higher.

Overview

Affected versions of this package are vulnerable to Session Fixation when database session storage is enabled - which it is not by default. A user whose session has been deleted via web interface or API can continue to access the session. User sessions that are automatically deleted due to account deactivation or deletion are also affected.

Workaround

This vulnerability can be avoided by using cache-based session storage instead of database-based.

CVSS Base Scores

version 4.0
version 3.1