Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-h5j9-cvrw-v5qh | listmonk's active sessions remain valid after password reset and password change |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 03 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nadh
Nadh listmonk |
|
| Vendors & Products |
Nadh
Nadh listmonk |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | listmonk is a standalone, self-hosted, newsletter and mailing list manager. From version 4.1.0 to before version 6.1.0, a session management vulnerability allows previously issued authenticated sessions to remain valid after sensitive account security changes, specifically password reset and password change. As a result, an attacker who has already obtained a valid session cookie can retain access to the account even after the victim changes or resets their password. This weakens account recovery and session security guarantees. This issue has been patched in version 6.1.0. | |
| Title | listmonk: Active sessions remain valid after password reset and password change | |
| Weaknesses | CWE-613 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-03T17:33:57.751Z
Reserved: 2026-03-30T20:52:53.283Z
Link: CVE-2026-34828
Updated: 2026-04-03T17:33:52.285Z
Status : Awaiting Analysis
Published: 2026-04-02T18:16:33.713
Modified: 2026-04-03T16:10:23.730
Link: CVE-2026-34828
No data.
OpenCVE Enrichment
Updated: 2026-04-03T09:17:17Z
Github GHSA