Vulnerability Description
Rack::Session is a session management implementation for Rack. In versions starting from 2.0.0 to before 2.1.1, when using the Rack::Session::Pool middleware, and provided the attacker can acquire a session cookie (already a major issue), the session may be restored if the attacker can trigger a long running request (within that same session) adjacent to the user logging out, in order to retain illicit access even after a user has attempted to logout. This issue has been patched in version 2.1.1.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/rack/rack-session/commit/c28c4a8c1861d814e09f2ae48264ac4c40be
- https://github.com/rack/rack-session/security/advisories/GHSA-9j94-67jr-4cqj
- https://github.com/rack/rack/security/advisories/GHSA-vpfw-47h7-xj4g
FAQ
What is CVE-2025-46336?
CVE-2025-46336 is a vulnerability with a CVSS score of 4.2 (MEDIUM). Rack::Session is a session management implementation for Rack. In versions starting from 2.0.0 to before 2.1.1, when using the Rack::Session::Pool middleware, and provided the attacker can acquire a s...
How severe is CVE-2025-46336?
CVE-2025-46336 has been rated MEDIUM with a CVSS base score of 4.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-46336?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.