First published: Fri Apr 18 2025(Updated: )
An access control vulnerability in Nagios Network Analyzer 2024R1.0.3 allows deleted users to retain access to system resources due to improper session invalidation and stale token handling. When an administrator deletes a user account, the backend fails to terminate active sessions and revoke associated API tokens, enabling unauthorized access to restricted functions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nagios Network Analyzer |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-28059 is currently classified as moderate due to potential unauthorized access to system resources.
To fix CVE-2025-28059, ensure that session invalidation and token revocation are properly implemented in the Nagios Network Analyzer configuration.
CVE-2025-28059 affects Nagios Network Analyzer version 2024R1.0.3.
CVE-2025-28059 allows deleted users to retain access to system resources, which poses a significant security risk.
Administrators and security professionals using Nagios Network Analyzer should be concerned about CVE-2025-28059 due to the risk of unauthorized access.