|
| 1 | +--- |
| 2 | +layout: advisory |
| 3 | +title: 'CVE-2026-44511 (katalyst-koi): Session cookies can be replayed after user |
| 4 | + logout' |
| 5 | +comments: false |
| 6 | +categories: |
| 7 | +- katalyst-koi |
| 8 | +advisory: |
| 9 | + gem: katalyst-koi |
| 10 | + cve: 2026-44511 |
| 11 | + ghsa: 4cx3-3c38-j9vv |
| 12 | + url: https://github.com/katalyst/koi/security/advisories/GHSA-4cx3-3c38-j9vv |
| 13 | + title: Session cookies can be replayed after user logout |
| 14 | + date: 2026-05-07 |
| 15 | + description: |- |
| 16 | + ### Impact |
| 17 | +
|
| 18 | + Admin session cookies were not invalidated when an admin user logged |
| 19 | + out. An attacker with access to a valid admin session cookie could |
| 20 | + continue to access admin functionality after logout, until the |
| 21 | + cookie expired or session secrets were rotated. |
| 22 | +
|
| 23 | + This affects applications using Koi admin authentication where an |
| 24 | + admin session cookie may have been exposed, cached, intercepted, or |
| 25 | + otherwise retained after logout. |
| 26 | +
|
| 27 | + ### Patches |
| 28 | +
|
| 29 | + The issue has been patched by recording admin logout time and |
| 30 | + rejecting any admin session cookie created before the user’s |
| 31 | + most recent logout. |
| 32 | +
|
| 33 | + Users should upgrade to the patched Koi releases once available. |
| 34 | +
|
| 35 | + ### Workarounds |
| 36 | +
|
| 37 | + Katalyst Koi recommends upgrading to the latest available version, |
| 38 | + or back porting the changes released in 5.6.0/4.20.0 |
| 39 | +
|
| 40 | + ### Resources |
| 41 | +
|
| 42 | + This is an application of https://guides.rubyonrails.org/v5.2.0/security.html#replay-attacks-for-cookiestore-sessions . |
| 43 | + cvss_v3: 7.4 |
| 44 | + patched_versions: |
| 45 | + - "~> 4.20.0" |
| 46 | + - ">= 5.6.0" |
| 47 | + related: |
| 48 | + url: |
| 49 | + - https://nvd.nist.gov/vuln/detail/CVE-2026-44511 |
| 50 | + - https://github.com/katalyst/koi/commit/606b33c140a61b1a2b37878ca7504741ec68df33 |
| 51 | + - https://github.com/katalyst/koi/commit/fdbfb404a9500f7fed33e03ab2eb7c2578f9652c |
| 52 | + - https://github.com/katalyst/koi/security/advisories/GHSA-4cx3-3c38-j9vv |
| 53 | + - https://guides.rubyonrails.org/v5.2.0/security.html#replay-attacks-for-cookiestore-sessions |
| 54 | + - https://github.com/advisories/GHSA-4cx3-3c38-j9vv |
| 55 | +--- |
0 commit comments