Project Subscriptions
No data.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4cx3-3c38-j9vv | katalyst-koi: Session cookies can be replayed after user logout |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 14 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Katalyst Koi is a framework for building Rails admin functionality. Prior to 4.20.0 and 5.6.0, admin session cookies were not invalidated when an admin user logged out. An attacker with access to a valid admin session cookie could continue to access admin functionality after logout, until the cookie expired or session secrets were rotated. This vulnerability is fixed in 4.20.0 and 5.6.0. | |
| Title | Katalyst Koi: Session cookies can be replayed after user logout | |
| Weaknesses | CWE-613 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T18:34:47.908Z
Reserved: 2026-05-06T18:28:20.887Z
Link: CVE-2026-44511
Updated: 2026-05-14T18:34:42.735Z
Status : Deferred
Published: 2026-05-14T17:16:22.760
Modified: 2026-05-14T18:19:25.260
Link: CVE-2026-44511
No data.
OpenCVE Enrichment
Updated: 2026-05-14T19:00:13Z
Github GHSA