CVE-2026-34828: CWE-613: Insufficient Session Expiration in knadh listmonk
listmonk is a standalone, self-hosted, newsletter and mailing list manager. From version 4.1.0 to before version 6.1.0, a session management vulnerability allows previously issued authenticated sessions to remain valid after sensitive account security changes, specifically password reset and password change. As a result, an attacker who has already obtained a valid session cookie can retain access to the account even after the victim changes or resets their password. This weakens account recovery and session security guarantees. This issue has been patched in version 6.1.0.
AI Analysis
Technical Summary
CVE-2026-34828 affects listmonk, a self-hosted newsletter and mailing list management software, in versions from 4.1.0 to before 6.1.0. The vulnerability arises from insufficient session expiration controls, specifically the failure to invalidate existing authenticated sessions when a user changes or resets their password. Normally, password changes should invalidate all active sessions to prevent unauthorized access if credentials are compromised. However, in this case, session tokens issued prior to the password change remain valid, allowing an attacker who has obtained such a token to continue accessing the victim's account. This weakens the security guarantees of account recovery and session management. The vulnerability is categorized under CWE-613, which relates to improper session expiration. The CVSS v3.1 base score is 7.1, reflecting high severity due to network attack vector, low attack complexity, and the requirement of privileges (a valid session). The impact is primarily on confidentiality, as unauthorized access to account data is possible, with limited impact on integrity and no impact on availability. No user interaction is required for exploitation. The issue was publicly disclosed and patched in version 6.1.0 of listmonk. No known exploits in the wild have been reported yet.
Potential Impact
The vulnerability allows attackers who have previously obtained valid session cookies to maintain persistent unauthorized access to listmonk accounts even after victims change or reset their passwords. This undermines the effectiveness of password resets as a security measure, potentially enabling prolonged data exposure, unauthorized newsletter management, and manipulation of mailing lists. Organizations relying on listmonk for communication may face confidentiality breaches, reputational damage, and compliance risks if sensitive subscriber data is exposed. The persistence of sessions post-password change also complicates incident response and recovery efforts. While the vulnerability does not directly impact system availability or integrity, the unauthorized access can lead to indirect impacts such as phishing campaigns or spam distribution through compromised accounts. The risk is heightened in environments where session tokens are not otherwise protected or monitored, and where attackers have means to steal session cookies (e.g., via network interception, XSS, or insider threats).
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade listmonk installations to version 6.1.0 or later, where the issue is patched. Until upgrading is possible, administrators should implement additional session management controls such as manual invalidation of all active sessions upon password changes or resets. Employing short session lifetimes and requiring re-authentication for sensitive operations can reduce exposure. Monitoring for unusual session activity and implementing secure cookie attributes (HttpOnly, Secure, SameSite) can help protect session tokens from theft. Network-level protections such as enforcing HTTPS and using VPNs can reduce the risk of session interception. Additionally, educating users on secure session practices and monitoring logs for suspicious access patterns can aid in early detection. Finally, integrating multi-factor authentication (MFA) can provide an additional security layer that limits the impact of compromised session tokens.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, India, Brazil, Japan
CVE-2026-34828: CWE-613: Insufficient Session Expiration in knadh listmonk
Description
listmonk is a standalone, self-hosted, newsletter and mailing list manager. From version 4.1.0 to before version 6.1.0, a session management vulnerability allows previously issued authenticated sessions to remain valid after sensitive account security changes, specifically password reset and password change. As a result, an attacker who has already obtained a valid session cookie can retain access to the account even after the victim changes or resets their password. This weakens account recovery and session security guarantees. This issue has been patched in version 6.1.0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-34828 affects listmonk, a self-hosted newsletter and mailing list management software, in versions from 4.1.0 to before 6.1.0. The vulnerability arises from insufficient session expiration controls, specifically the failure to invalidate existing authenticated sessions when a user changes or resets their password. Normally, password changes should invalidate all active sessions to prevent unauthorized access if credentials are compromised. However, in this case, session tokens issued prior to the password change remain valid, allowing an attacker who has obtained such a token to continue accessing the victim's account. This weakens the security guarantees of account recovery and session management. The vulnerability is categorized under CWE-613, which relates to improper session expiration. The CVSS v3.1 base score is 7.1, reflecting high severity due to network attack vector, low attack complexity, and the requirement of privileges (a valid session). The impact is primarily on confidentiality, as unauthorized access to account data is possible, with limited impact on integrity and no impact on availability. No user interaction is required for exploitation. The issue was publicly disclosed and patched in version 6.1.0 of listmonk. No known exploits in the wild have been reported yet.
Potential Impact
The vulnerability allows attackers who have previously obtained valid session cookies to maintain persistent unauthorized access to listmonk accounts even after victims change or reset their passwords. This undermines the effectiveness of password resets as a security measure, potentially enabling prolonged data exposure, unauthorized newsletter management, and manipulation of mailing lists. Organizations relying on listmonk for communication may face confidentiality breaches, reputational damage, and compliance risks if sensitive subscriber data is exposed. The persistence of sessions post-password change also complicates incident response and recovery efforts. While the vulnerability does not directly impact system availability or integrity, the unauthorized access can lead to indirect impacts such as phishing campaigns or spam distribution through compromised accounts. The risk is heightened in environments where session tokens are not otherwise protected or monitored, and where attackers have means to steal session cookies (e.g., via network interception, XSS, or insider threats).
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade listmonk installations to version 6.1.0 or later, where the issue is patched. Until upgrading is possible, administrators should implement additional session management controls such as manual invalidation of all active sessions upon password changes or resets. Employing short session lifetimes and requiring re-authentication for sensitive operations can reduce exposure. Monitoring for unusual session activity and implementing secure cookie attributes (HttpOnly, Secure, SameSite) can help protect session tokens from theft. Network-level protections such as enforcing HTTPS and using VPNs can reduce the risk of session interception. Additionally, educating users on secure session practices and monitoring logs for suspicious access patterns can aid in early detection. Finally, integrating multi-factor authentication (MFA) can provide an additional security layer that limits the impact of compromised session tokens.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-30T20:52:53.283Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cead0fe6bfc5ba1df180b1
Added to database: 4/2/2026, 5:53:19 PM
Last enriched: 4/2/2026, 6:08:21 PM
Last updated: 4/3/2026, 6:00:15 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.