Session Management Flaw in Wire Web Application by Wire
CVE-2025-48061

5.6MEDIUM

Key Information:

Vendor

Wireapp

Vendor
CVE Published:
22 May 2025

What is CVE-2025-48061?

The wire-webapp, which serves as the web interface for the open-source messaging service Wire, contains a session management vulnerability due to a regression in its functionality. After a user logs out, there is a risk of the session not being properly invalidated, resulting in the user being automatically logged back in upon re-accessing the application. This issue does not manifest if the user opts for temporary access or chooses to delete personal information during the logout process. The issue has been addressed in the release of wire-webapp version 2025-05-20-production.0. As a precaution, it is recommended to utilize these options to mitigate the risk until the application is updated.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

wire-webapp < 2025-05-20-production.0

References

CVSS V3.1

Score:
5.6
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
High
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.