Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-gq2m-77hf-vwgh | OliveTin Session Fixation: Logout Fails to Invalidate Server-Side Session |
Thu, 12 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:olivetin:olivetin:*:*:*:*:*:*:*:* |
Mon, 09 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Olivetin
Olivetin olivetin |
|
| Vendors & Products |
Olivetin
Olivetin olivetin |
Fri, 06 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.11.1, OliveTin does not revoke server-side sessions when a user logs out. Although the browser cookie is cleared, the corresponding session remains valid in server storage until expiry (default ≈ 1 year). An attacker with a previously stolen or captured session cookie can continue authenticating after logout, resulting in a post-logout authentication bypass. This is a session management flaw that violates expected logout semantics. This issue has been patched in version 3000.11.1. | |
| Title | OliveTin: Session Fixation - Logout Fails to Invalidate Server-Side Session | |
| Weaknesses | CWE-384 CWE-613 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-09T20:54:29.979Z
Reserved: 2026-03-04T17:23:59.797Z
Link: CVE-2026-30224
Updated: 2026-03-09T20:51:38.360Z
Status : Analyzed
Published: 2026-03-06T21:16:16.280
Modified: 2026-03-12T15:57:33.710
Link: CVE-2026-30224
No data.
OpenCVE Enrichment
Updated: 2026-04-16T11:15:27Z
Github GHSA