Insufficient Session Expiration Affecting getkirby/cms package, versions <3.5.8.3>=3.6.0, <3.6.6.3>=3.7.0, <3.7.5.2>=3.8.0, <3.8.4.1>=3.9.0, <3.9.6


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.18% (56th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Insufficient Session Expiration vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-GETKIRBYCMS-5808442
  • published28 Jul 2023
  • disclosed28 Jul 2023
  • credit5hank4r

Introduced: 28 Jul 2023

CVE-2023-38489  (opens in a new tab)
CWE-613  (opens in a new tab)

How to fix?

Upgrade getkirby/cms to version 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, 3.9.6 or higher.

Overview

Affected versions of this package are vulnerable to Insufficient Session Expiration. This issue allows attackers to stay logged in to a Kirby site on another device even if the logged-in user has since changed their password. Kirby does not invalidate user sessions that were created with a password that was since changed by the user or by a site admin. If a user changed their password to lock out an attacker who was already in possession of the previous password or of a login session on another device or browser, the attacker would not be reliably prevented from accessing the Kirby site as the affected user.

Note:

This issue affects all Kirby sites with user accounts (unless Kirby's API and Panel are disabled in the config). It can only be abused if a Kirby user is logged in on a device or browser that is shared with potentially untrusted users or if an attacker already maliciously used a previous password to log in to a Kirby site as the affected user.

CVSS Scores

version 3.1