Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34828: CWE-613: Insufficient Session Expiration in knadh listmonk

0
High
VulnerabilityCVE-2026-34828cvecve-2026-34828cwe-613
Published: Thu Apr 02 2026 (04/02/2026, 17:32:24 UTC)
Source: CVE Database V5
Vendor/Project: knadh
Product: listmonk

Description

listmonk is a standalone, self-hosted, newsletter and mailing list manager. From version 4.1.0 to before version 6.1.0, a session management vulnerability allows previously issued authenticated sessions to remain valid after sensitive account security changes, specifically password reset and password change. As a result, an attacker who has already obtained a valid session cookie can retain access to the account even after the victim changes or resets their password. This weakens account recovery and session security guarantees. This issue has been patched in version 6.1.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 18:08:21 UTC

Technical Analysis

CVE-2026-34828 affects listmonk, a self-hosted newsletter and mailing list management software, in versions from 4.1.0 to before 6.1.0. The vulnerability arises from insufficient session expiration controls, specifically the failure to invalidate existing authenticated sessions when a user changes or resets their password. Normally, password changes should invalidate all active sessions to prevent unauthorized access if credentials are compromised. However, in this case, session tokens issued prior to the password change remain valid, allowing an attacker who has obtained such a token to continue accessing the victim's account. This weakens the security guarantees of account recovery and session management. The vulnerability is categorized under CWE-613, which relates to improper session expiration. The CVSS v3.1 base score is 7.1, reflecting high severity due to network attack vector, low attack complexity, and the requirement of privileges (a valid session). The impact is primarily on confidentiality, as unauthorized access to account data is possible, with limited impact on integrity and no impact on availability. No user interaction is required for exploitation. The issue was publicly disclosed and patched in version 6.1.0 of listmonk. No known exploits in the wild have been reported yet.

Potential Impact

The vulnerability allows attackers who have previously obtained valid session cookies to maintain persistent unauthorized access to listmonk accounts even after victims change or reset their passwords. This undermines the effectiveness of password resets as a security measure, potentially enabling prolonged data exposure, unauthorized newsletter management, and manipulation of mailing lists. Organizations relying on listmonk for communication may face confidentiality breaches, reputational damage, and compliance risks if sensitive subscriber data is exposed. The persistence of sessions post-password change also complicates incident response and recovery efforts. While the vulnerability does not directly impact system availability or integrity, the unauthorized access can lead to indirect impacts such as phishing campaigns or spam distribution through compromised accounts. The risk is heightened in environments where session tokens are not otherwise protected or monitored, and where attackers have means to steal session cookies (e.g., via network interception, XSS, or insider threats).

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade listmonk installations to version 6.1.0 or later, where the issue is patched. Until upgrading is possible, administrators should implement additional session management controls such as manual invalidation of all active sessions upon password changes or resets. Employing short session lifetimes and requiring re-authentication for sensitive operations can reduce exposure. Monitoring for unusual session activity and implementing secure cookie attributes (HttpOnly, Secure, SameSite) can help protect session tokens from theft. Network-level protections such as enforcing HTTPS and using VPNs can reduce the risk of session interception. Additionally, educating users on secure session practices and monitoring logs for suspicious access patterns can aid in early detection. Finally, integrating multi-factor authentication (MFA) can provide an additional security layer that limits the impact of compromised session tokens.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-30T20:52:53.283Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cead0fe6bfc5ba1df180b1

Added to database: 4/2/2026, 5:53:19 PM

Last enriched: 4/2/2026, 6:08:21 PM

Last updated: 4/3/2026, 6:00:15 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses