Description
listmonk is a standalone, self-hosted, newsletter and mailing list manager. From version 4.1.0 to before version 6.1.0, a session management vulnerability allows previously issued authenticated sessions to remain valid after sensitive account security changes, specifically password reset and password change. As a result, an attacker who has already obtained a valid session cookie can retain access to the account even after the victim changes or resets their password. This weakens account recovery and session security guarantees. This issue has been patched in version 6.1.0.
Problem types
CWE-613: Insufficient Session Expiration
Product status
References
github.com/...stmonk/security/advisories/GHSA-h5j9-cvrw-v5qh
github.com/...ommit/db82035d619348949512dafdaf60c86037cafc9e
github.com/knadh/listmonk/releases/tag/v6.1.0