CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-46336: Rack session gets restored after deletion

4.2 CVSS

Description

Rack::Session is a session management implementation for Rack. In versions starting from 2.0.0 to before 2.1.1, when using the Rack::Session::Pool middleware, and provided the attacker can acquire a session cookie (already a major issue), the session may be restored if the attacker can trigger a long running request (within that same session) adjacent to the user logging out, in order to retain illicit access even after a user has attempted to logout. This issue has been patched in version 2.1.1.

Classification

CVE ID: CVE-2025-46336

CVSS Base Severity: MEDIUM

CVSS Base Score: 4.2

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N

Problem Types

CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition CWE-613: Insufficient Session Expiration

Affected Products

Vendor: rack

Product: rack-session

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.03% (probability of being exploited)

EPSS Percentile: 5.19% (scored less or equal to compared to others)

EPSS Date: 2025-06-06 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-46336
https://github.com/rack/rack-session/security/advisories/GHSA-9j94-67jr-4cqj
https://github.com/rack/rack/security/advisories/GHSA-vpfw-47h7-xj4g
https://github.com/rack/rack-session/commit/c28c4a8c1861d814e09f2ae48264ac4c40be2d3b

Timeline