Home

Description

listmonk is a standalone, self-hosted, newsletter and mailing list manager. From version 4.1.0 to before version 6.1.0, a session management vulnerability allows previously issued authenticated sessions to remain valid after sensitive account security changes, specifically password reset and password change. As a result, an attacker who has already obtained a valid session cookie can retain access to the account even after the victim changes or resets their password. This weakens account recovery and session security guarantees. This issue has been patched in version 6.1.0.

PUBLISHED Reserved 2026-03-30 | Published 2026-04-02 | Updated 2026-04-03 | Assigner GitHub_M




HIGH: 7.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

Problem types

CWE-613: Insufficient Session Expiration

Product status

>= 4.1.0, < 6.1.0
affected

References

github.com/...stmonk/security/advisories/GHSA-h5j9-cvrw-v5qh

github.com/...ommit/db82035d619348949512dafdaf60c86037cafc9e

github.com/knadh/listmonk/releases/tag/v6.1.0

cve.org (CVE-2026-34828)

nvd.nist.gov (CVE-2026-34828)

Download JSON