Vulnerability Description
An access control vulnerability in Nagios Network Analyzer 2024R1.0.3 allows deleted users to retain access to system resources due to improper session invalidation and stale token handling. When an administrator deletes a user account, the backend fails to terminate active sessions and revoke associated API tokens, enabling unauthorized access to restricted functions.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nagios | Network Analyzer | 2024 |
Related Weaknesses (CWE)
References
- https://github.com/aakashtyal/Residual-Data-Access-Post-User-Deletion-in-Nagios-Third Party Advisory
- https://www.nagios.com/changelog/#network-analyzeRelease Notes
FAQ
What is CVE-2025-28059?
CVE-2025-28059 is a vulnerability with a CVSS score of 7.5 (HIGH). An access control vulnerability in Nagios Network Analyzer 2024R1.0.3 allows deleted users to retain access to system resources due to improper session invalidation and stale token handling. When an a...
How severe is CVE-2025-28059?
CVE-2025-28059 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-28059?
Check the references section above for vendor advisories and patch information. Affected products include: Nagios Network Analyzer.