Kirby vulnerable to Insufficient Session Expiration after a password change
CVE-2023-38489
What is CVE-2023-38489?
A security flaw in Kirby CMS allows attackers to retain access to user sessions even after a password change. This can happen when a user logs in on shared or untrusted devices, permitting unauthorized access to their account. The issue stems from the failure to invalidate sessions tied to an old password. To mitigate this vulnerability, updates in versions 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 ensure that the system tracks hashed passwords for active sessions, effectively logging out users when a password is changed.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
kirby < 3.5.8.3 < 3.5.8.3
kirby >= 3.6.0, < 3.6.6.3 < 3.6.0, 3.6.6.3
kirby >= 3.7.0, < 3.7.5.2 < 3.7.0, 3.7.5.2
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
