Home

Description

The Data Sharing Framework (DSF) implements a distributed process engine based on the BPMN 2.0 and FHIR R4 standards. Prior to 2.1.0, OIDC-authenticated sessions had no configured maximum inactivity timeout. Sessions persisted indefinitely after login, even after the OIDC access token expired. This vulnerability is fixed in 2.1.0.

PUBLISHED Reserved 2026-04-15 | Published 2026-04-21 | Updated 2026-04-22 | Assigner GitHub_M




MEDIUM: 6.8CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-613: Insufficient Session Expiration

Product status

< 2.1.0
affected

< 2.1.0
affected

< 2.1.0
affected

< 2.1.0
affected

References

github.com/...rk/dsf/security/advisories/GHSA-gj7p-595x-qwf5

github.com/...ommit/f4ecb002f7d12642f92da6b79371ed367d0140e7

dsf.dev/operations/v2.1.0/bpe/oidc.html

dsf.dev/operations/v2.1.0/fhir/oidc.html

cve.org (CVE-2026-40939)

nvd.nist.gov (CVE-2026-40939)

Download JSON