CVE-2025-46336 – Rack::Session Pool Session Restoration Vulnerability

The following table lists the changes that have been made to the
CVE-2025-46336 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    May. 08, 2025

    Action Type Old Value New Value
    Added Description Rack::Session is a session management implementation for Rack. In versions starting from 2.0.0 to before 2.1.1, when using the Rack::Session::Pool middleware, and provided the attacker can acquire a session cookie (already a major issue), the session may be restored if the attacker can trigger a long running request (within that same session) adjacent to the user logging out, in order to retain illicit access even after a user has attempted to logout. This issue has been patched in version 2.1.1.
    Added CVSS V3.1 AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
    Added CWE CWE-362
    Added CWE CWE-613
    Added CWE CWE-367
    Added Reference https://github.com/rack/rack/security/advisories/GHSA-vpfw-47h7-xj4g
    Added Reference https://github.com/rack/rack-session/commit/c28c4a8c1861d814e09f2ae48264ac4c40be2d3b
    Added Reference https://github.com/rack/rack-session/security/advisories/GHSA-9j94-67jr-4cqj
Share the Post:

Related Posts