Authentication Token Exposure in Misskey Platform by Misskey Dev
CVE-2025-24896

8.1HIGH

Key Information:

Status
Vendor
CVE Published:
11 February 2025

What is CVE-2025-24896?

The Misskey platform has a vulnerability where the login token, named 'token', remains stored in a cookie even after user logout. This flaw primarily affects users who access Misskey on public or shared devices, as it may expose their authentication credentials to subsequent users of the device. Even those who log out before lending their devices can be at risk if the token is not properly cleared. The issue is resolved in version 2025.2.0-alpha.0, which ensures that tokens are securely managed and deleted upon logout, enhancing user privacy and security.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

misskey >= 12.109.0, < 2025.2.0-alpha.0

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.