Cyber Posture

CVE-2025-24896

High

Published: 11 February 2025

Published
11 February 2025
Modified
20 February 2025
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
EPSS Score 0.0027 50.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries can use stolen session cookies to authenticate to web applications and services.

Security Summary

CVE-2025-24896 is a session management vulnerability in the Bull Dashboard component of Misskey, an open source federated social media platform. Affecting versions starting from 12.109.0 and prior to 2025.2.0-alpha.0, the issue stems from a login token named `token`, stored in a cookie for authentication, that persists even after a user logs out. This flaw, classified under CWE-613 (Insufficient Session Expiration), has a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N), indicating high severity due to its potential for remote exploitation with user interaction.

An attacker can exploit this vulnerability by accessing a victim's browser or device after the victim has logged out of Misskey, such as on a public PC or a shared device lent to someone else. By extracting the undeleted `token` cookie, the attacker can authenticate to the Bull Dashboard over the network without further privileges, achieving high confidentiality and integrity impacts. This enables unauthorized access to potentially sensitive queue management functions, effectively hijacking the session.

The Misskey security advisory (GHSA-w98m-j6hq-cwjm) and the fixing commit (ba9f295ef2bf31cc90fa587e20b9a7655b7a1824) confirm that version 2025.2.0-alpha.0 resolves the issue by properly deleting the token cookie upon logout. Security practitioners should advise Misskey administrators to update to 2025.2.0-alpha.0 or later and recommend users clear browser cookies or avoid shared devices for authentication.

Details

CWE(s)
CWE-613

Affected Products

misskey
misskey
12.109.0 — 2025.1.0

MITRE ATT&CK Enterprise Techniques

T1539 Steal Web Session Cookie Credential Access
An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.
T1550.004 Web Session Cookie Lateral Movement
Adversaries can use stolen session cookies to authenticate to web applications and services.
Why these techniques?

The vulnerability (insufficient session expiration) leaves an authentication token cookie valid after logout, directly enabling extraction of the web session cookie from a device/browser (T1539) and subsequent use of that cookie as alternate authentication material to hijack access to the dashboard (T1550.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References