CVE-2025-48061: CWE-613: Insufficient Session Expiration in wireapp wire-webapp
wire-webapp is the web application for the open-source messaging service Wire. A change caused a regression resulting in sessions not being properly invalidated. A user that logged out of the Wire webapp, could have been automatically logged in again after re-opening the application. This does not happen when the user is logged in as a temporary user by selecting "This is a public computer" during login or the user selects "Delete all your personal information and conversations on this device" upon logout. The underlying issue has been fixed with wire-webapp version 2025-05-20-production.0. As a workaround, this behavior can be prevented by either deleting all information upon logout as well as logging in as a temporary client.
AI Analysis
Technical Summary
CVE-2025-48061 is a medium-severity vulnerability classified under CWE-613 (Insufficient Session Expiration) affecting the wire-webapp, the web application component of the open-source messaging service Wire. The vulnerability arises from a regression introduced in the application, causing user sessions not to be properly invalidated upon logout. Specifically, when a user logs out, the session token or authentication state remains valid, allowing the user to be automatically logged back in upon reopening the application without re-authentication. This behavior does not occur if the user logs in as a temporary user by selecting "This is a public computer" during login or opts to delete all personal information and conversations on the device upon logout. The root cause is insufficient session expiration controls, which violate secure session management best practices by failing to terminate sessions effectively. The issue has been addressed and fixed in wire-webapp version 2025-05-20-production.0. Until users upgrade, the vulnerability can be mitigated by either deleting all local data upon logout or using the temporary client login option. The CVSS v3.1 score is 5.6 (medium), reflecting that exploitation requires local access (AV:L), high attack complexity (AC:H), and high privileges (PR:H), with user interaction (UI:R) needed. The impact includes potential unauthorized access to user accounts, compromising confidentiality and integrity of messages and personal data, though availability is not affected. No known exploits are reported in the wild as of now.
Potential Impact
For European organizations using the Wire messaging platform, this vulnerability could lead to unauthorized access to sensitive communications if an attacker gains physical or local access to a user's device. Since the session remains active after logout, an attacker with access to the device could reopen the webapp and gain access without credentials, potentially exposing confidential business communications, personal data, or intellectual property. This risk is particularly relevant for organizations with remote or shared work environments where devices may be left unattended. The confidentiality and integrity of communications are at risk, which could lead to data breaches or espionage. However, the requirement for local access and high privileges limits remote exploitation, reducing the risk of large-scale automated attacks. The vulnerability also poses privacy concerns under GDPR, as unauthorized access to personal data could result in regulatory penalties. Organizations relying on Wire for secure messaging must consider this risk in their threat models and incident response plans.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading wire-webapp to version 2025-05-20-production.0 or later, where the issue is fixed. Until then, users should be instructed to always select the "This is a public computer" option when logging in on shared or non-personal devices, which enforces session expiration. Additionally, users should be encouraged to use the "Delete all your personal information and conversations on this device" option upon logout to clear local session data. Organizations can implement endpoint management policies to enforce browser data clearance or session logout procedures. Monitoring for unusual session persistence or access patterns on devices can help detect exploitation attempts. Training users on secure logout practices and physical device security is also critical. For high-security environments, consider restricting wire-webapp usage to dedicated devices with strict access controls. Finally, integrating session timeout policies and multi-factor authentication can further reduce risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Switzerland
CVE-2025-48061: CWE-613: Insufficient Session Expiration in wireapp wire-webapp
Description
wire-webapp is the web application for the open-source messaging service Wire. A change caused a regression resulting in sessions not being properly invalidated. A user that logged out of the Wire webapp, could have been automatically logged in again after re-opening the application. This does not happen when the user is logged in as a temporary user by selecting "This is a public computer" during login or the user selects "Delete all your personal information and conversations on this device" upon logout. The underlying issue has been fixed with wire-webapp version 2025-05-20-production.0. As a workaround, this behavior can be prevented by either deleting all information upon logout as well as logging in as a temporary client.
AI-Powered Analysis
Technical Analysis
CVE-2025-48061 is a medium-severity vulnerability classified under CWE-613 (Insufficient Session Expiration) affecting the wire-webapp, the web application component of the open-source messaging service Wire. The vulnerability arises from a regression introduced in the application, causing user sessions not to be properly invalidated upon logout. Specifically, when a user logs out, the session token or authentication state remains valid, allowing the user to be automatically logged back in upon reopening the application without re-authentication. This behavior does not occur if the user logs in as a temporary user by selecting "This is a public computer" during login or opts to delete all personal information and conversations on the device upon logout. The root cause is insufficient session expiration controls, which violate secure session management best practices by failing to terminate sessions effectively. The issue has been addressed and fixed in wire-webapp version 2025-05-20-production.0. Until users upgrade, the vulnerability can be mitigated by either deleting all local data upon logout or using the temporary client login option. The CVSS v3.1 score is 5.6 (medium), reflecting that exploitation requires local access (AV:L), high attack complexity (AC:H), and high privileges (PR:H), with user interaction (UI:R) needed. The impact includes potential unauthorized access to user accounts, compromising confidentiality and integrity of messages and personal data, though availability is not affected. No known exploits are reported in the wild as of now.
Potential Impact
For European organizations using the Wire messaging platform, this vulnerability could lead to unauthorized access to sensitive communications if an attacker gains physical or local access to a user's device. Since the session remains active after logout, an attacker with access to the device could reopen the webapp and gain access without credentials, potentially exposing confidential business communications, personal data, or intellectual property. This risk is particularly relevant for organizations with remote or shared work environments where devices may be left unattended. The confidentiality and integrity of communications are at risk, which could lead to data breaches or espionage. However, the requirement for local access and high privileges limits remote exploitation, reducing the risk of large-scale automated attacks. The vulnerability also poses privacy concerns under GDPR, as unauthorized access to personal data could result in regulatory penalties. Organizations relying on Wire for secure messaging must consider this risk in their threat models and incident response plans.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading wire-webapp to version 2025-05-20-production.0 or later, where the issue is fixed. Until then, users should be instructed to always select the "This is a public computer" option when logging in on shared or non-personal devices, which enforces session expiration. Additionally, users should be encouraged to use the "Delete all your personal information and conversations on this device" option upon logout to clear local session data. Organizations can implement endpoint management policies to enforce browser data clearance or session logout procedures. Monitoring for unusual session persistence or access patterns on devices can help detect exploitation attempts. Training users on secure logout practices and physical device security is also critical. For high-security environments, consider restricting wire-webapp usage to dedicated devices with strict access controls. Finally, integrating session timeout policies and multi-factor authentication can further reduce risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-05-15T16:06:40.941Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f5d2a0acd01a249264046
Added to database: 5/22/2025, 5:21:46 PM
Last enriched: 7/8/2025, 9:13:09 AM
Last updated: 8/3/2025, 4:22:45 AM
Views: 19
Related Threats
CVE-2025-49895: CWE-352 Cross-Site Request Forgery (CSRF) in iThemes ServerBuddy by PluginBuddy.com
HighCVE-2025-55284: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in anthropics claude-code
HighCVE-2025-55286: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in vancluever z2d
HighCVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.