CVE-2025-28132

A session management flaw in Nagios Network Analyzer 2024R1.0.3 allows an attacker to reuse session tokens even after a user logs out, leading to unauthorized access and account takeover. This occurs due to insufficient session expiration, where session tokens remain valid beyond logout, allowing an attacker to impersonate users and perform actions on their behalf.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:nagios:nagios_network_analyzer:2024:r1.0.3*:*:*:*:*:*:*

History

18 Jun 2025, 13:59

Type Values Removed Values Added
References () https://github.com/harshal79/Insufficient-Session-Expiration.git - () https://github.com/harshal79/Insufficient-Session-Expiration.git - Third Party Advisory
References () https://www.nagios.com/changelog/#network-analyzer - () https://www.nagios.com/changelog/#network-analyzer - Release Notes
First Time Nagios
Nagios nagios Network Analyzer
CPE cpe:2.3:a:nagios:nagios_network_analyzer:2024:r1.0.3*:*:*:*:*:*:*

01 Apr 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-01 17:15

Updated : 2025-06-18 13:59


NVD link : CVE-2025-28132

Mitre link : CVE-2025-28132


JSON object : View

Products Affected

nagios

  • nagios_network_analyzer
CWE

No CWE.