Insufficient Session Expiration Affecting katalyst-koi package, versions <4.20.0>=5.0.0.alpha.1, <5.6.0


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Insufficient Session Expiration vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-KATALYSTKOI-16624710
  • published10 May 2026
  • disclosed7 May 2026
  • creditUnknown

Introduced: 7 May 2026

NewCVE-2026-44511  (opens in a new tab)
CWE-613  (opens in a new tab)

How to fix?

Upgrade katalyst-koi to version 4.20.0, 5.6.0 or higher.

Overview

Affected versions of this package are vulnerable to Insufficient Session Expiration in the admin session cookie handling process. An attacker can maintain unauthorized access to administrative functionality by reusing a valid session cookie after a user logs out, until the cookie expires or session secrets are rotated.

CVSS Base Scores

version 4.0
version 3.1