Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65430: n/a

0
Medium
VulnerabilityCVE-2025-65430cvecve-2025-65430
Published: Mon Dec 15 2025 (12/15/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in allauth-django before 65.13.0. IdP: marking a user as is_active=False after having handed tokens for that user while the account was still active had no effect. Fixed the access/refresh tokens are now rejected.

AI-Powered Analysis

AILast updated: 12/15/2025, 14:31:59 UTC

Technical Analysis

CVE-2025-65430 identifies a security vulnerability in the allauth-django library, a popular Django package used for authentication and social account management. The flaw exists in versions prior to 65.13.0 and relates to the handling of user tokens after a user account is marked as inactive (is_active=False). Specifically, when an administrator or system marks a user as inactive, any previously issued access and refresh tokens for that user remain valid and usable. This means that even though the user account is logically disabled, the tokens can still be used to access protected resources, effectively bypassing the intended access control. The root cause is that the token validation logic did not check the current active status of the user at the time of token use. This vulnerability undermines the integrity of session management and user deactivation processes. The issue was resolved in version 65.13.0 by implementing token rejection for users marked inactive, ensuring that tokens cannot be used once the user is disabled. No public exploits have been reported, but the vulnerability presents a significant risk if exploited, especially in environments relying on allauth-django for identity provider (IdP) functionality. The vulnerability does not require user interaction and can be exploited by anyone possessing a valid token for a now inactive user, making it a critical concern for session security.

Potential Impact

For European organizations, this vulnerability poses a significant risk to confidentiality and integrity of user sessions and data. Unauthorized access via valid but logically revoked tokens can lead to data breaches, unauthorized actions, and compliance violations under regulations such as GDPR. Organizations using allauth-django in their authentication stack may inadvertently allow deactivated users or attackers with stolen tokens to maintain access to sensitive systems. This undermines trust in identity and access management controls and can facilitate lateral movement within networks. The impact is heightened in sectors with stringent access controls like finance, healthcare, and government. Additionally, failure to promptly revoke access tokens after user deactivation can lead to regulatory penalties and reputational damage. Since the vulnerability affects token validation logic, it can impact any service relying on allauth-django for OAuth2 or OpenID Connect flows, which are common in modern web applications across Europe.

Mitigation Recommendations

The primary mitigation is to upgrade allauth-django to version 65.13.0 or later, where the token rejection for inactive users is implemented. Organizations should audit their current versions and plan immediate updates. Additionally, review and enhance token revocation and session management policies to ensure tokens are invalidated promptly upon user deactivation or role changes. Implement monitoring to detect anomalous token usage, especially for accounts recently marked inactive. Consider enforcing short token lifetimes and using refresh token rotation to limit token reuse. For critical systems, implement additional checks in the authentication flow to verify user active status dynamically. Conduct penetration testing and code reviews to verify that token validation correctly respects user status. Finally, educate development and security teams about the importance of token lifecycle management and the risks of stale tokens.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 694017f1d9bcdf3f3ddec57d

Added to database: 12/15/2025, 2:15:13 PM

Last enriched: 12/15/2025, 2:31:59 PM

Last updated: 12/17/2025, 10:02:50 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats