First published: Fri Apr 11 2025(Updated: )
A session management vulnerability exists in Apache Roller before version 6.1.5 where active user sessions are not properly invalidated after password changes. When a user's password is changed, either by the user themselves or by an administrator, existing sessions remain active and usable. This allows continued access to the application through old sessions even after password changes, potentially enabling unauthorized access if credentials were compromised. This issue affects Apache Roller versions up to and including 6.1.4. The vulnerability is fixed in Apache Roller 6.1.5 by implementing centralized session management that properly invalidates all active sessions when passwords are changed or users are disabled.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Roller | <=6.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-24859 is considered a high severity vulnerability due to potential unauthorized access resulting from active sessions not being invalidated after a password change.
To fix CVE-2025-24859, upgrade Apache Roller to version 6.1.5 or later to ensure proper session invalidation during password changes.
The impact of CVE-2025-24859 can lead to unauthorized access where old sessions remain active, potentially allowing attackers to exploit valid user sessions.
CVE-2025-24859 affects all versions of Apache Roller prior to version 6.1.5.
Organizations using Apache Roller versions earlier than 6.1.5 are vulnerable to CVE-2025-24859 and should take immediate action to secure their systems.