Description
All versions of the package github.com/greenpau/caddy-security are vulnerable to Insufficient Session Expiration due to improper user session invalidation upon clicking the "Sign Out" button. User sessions remain valid even after requests are sent to /logout and /oauth2/google/logout. Attackers who gain access to an active but supposedly logged-out session can perform unauthorized actions on behalf of the user.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0739 | All versions of the package github.com/greenpau/caddy-security are vulnerable to Insufficient Session Expiration due to improper user session invalidation upon clicking the "Sign Out" button. User sessions remain valid even after requests are sent to /logout and /oauth2/google/logout. Attackers who gain access to an active but supposedly logged-out session can perform unauthorized actions on behalf of the user. |
Github GHSA |
GHSA-vp66-gf7w-9m4x | Insufficient Session Expiration in github.com/greenpau/caddy-security |
References
History
Tue, 23 Dec 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Authcrunch
Authcrunch caddy-security |
|
| CPEs | cpe:2.3:a:authcrunch:caddy-security:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Authcrunch
Authcrunch caddy-security |
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-12-06T18:30:09.279Z
Reserved: 2023-12-22T12:33:20.118Z
Link: CVE-2024-21492
Updated: 2024-08-01T22:20:40.830Z
Status : Analyzed
Published: 2024-02-17T05:15:08.223
Modified: 2025-12-23T20:15:15.333
Link: CVE-2024-21492
No data.
OpenCVE Enrichment
Updated: 2025-07-12T15:42:32Z
Weaknesses
EUVD
Github GHSA