| ID |
CVE-2026-1163
|
| Sažetak |
An insufficient session expiration vulnerability exists in the latest version of parisneo/lollms. The application fails to invalidate active sessions after a password reset, allowing an attacker to continue using an old session token. This issue arises due to the absence of logic to reject requests after a period of inactivity and the excessively long default session duration of 31 days. The vulnerability enables an attacker to maintain persistent access to a compromised account, even after the victim resets their password. |
| Reference |
|
| CVSS |
| Base: | 4.1 |
| Impact: | 3.4 |
| Exploitability: | 0.7 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
HIGH |
HIGH |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| LOW |
LOW |
LOW |
|
| CVSS vektor |
CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L |
| Zadnje važnije ažuriranje |
30-04-2026 - 16:16 |
| Objavljeno |
08-04-2026 - 03:16 |