7.1
CVE-2025-11699
- EPSS 0.04%
- Veröffentlicht 01.12.2025 15:17:57
- Zuletzt bearbeitet 19.12.2025 17:02:39
- Quelle cret@cert.org
- CVE-Watchlists
- Unerledigt
nopCommerce v4.70 and prior, and version 4.80.3, does not invalidate session cookies after logout or session termination, allowing an attacker who has a a valid session cookie access to privileged endpoints (such as /admin) even after the legitimate user has logged out, enabling session hijacking. Any version above 4.70 that is not 4.80.3 fixes the vulnerability.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Nopcommerce ≫ Nopcommerce Version < 4.70.0
Nopcommerce ≫ Nopcommerce Version4.80.3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.103 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 7.1 | 2.8 | 4.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N
|
CWE-613 Insufficient Session Expiration
According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."