{"api_version":"1","generated_at":"2026-04-10T16:40:30+00:00","cve":"CVE-2026-34828","urls":{"html":"https://cve.report/CVE-2026-34828","api":"https://cve.report/api/cve/CVE-2026-34828.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-34828","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-34828"},"summary":{"title":"listmonk: Active sessions remain valid after password reset and password change","description":"listmonk is a standalone, self-hosted, newsletter and mailing list manager. From version 4.1.0 to before version 6.1.0, a session management vulnerability allows previously issued authenticated sessions to remain valid after sensitive account security changes, specifically password reset and password change. As a result, an attacker who has already obtained a valid session cookie can retain access to the account even after the victim changes or resets their password. This weakens account recovery and session security guarantees. This issue has been patched in version 6.1.0.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-04-02 18:16:33","updated_at":"2026-04-03 16:10:23"},"problem_types":["CWE-613","CWE-613 CWE-613: Insufficient Session Expiration"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"7.1","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"7.1","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N","version":"3.1"}}],"references":[{"url":"https://github.com/knadh/listmonk/security/advisories/GHSA-h5j9-cvrw-v5qh","name":"https://github.com/knadh/listmonk/security/advisories/GHSA-h5j9-cvrw-v5qh","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/knadh/listmonk/releases/tag/v6.1.0","name":"https://github.com/knadh/listmonk/releases/tag/v6.1.0","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/knadh/listmonk/commit/db82035d619348949512dafdaf60c86037cafc9e","name":"https://github.com/knadh/listmonk/commit/db82035d619348949512dafdaf60c86037cafc9e","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-34828","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-34828","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"knadh","product":"listmonk","version":"affected >= 4.1.0, < 6.1.0","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"34828","cve":"CVE-2026-34828","epss":"0.000100000","percentile":"0.010690000","score_date":"2026-04-07","updated_at":"2026-04-08 00:03:39"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"product":"listmonk","vendor":"knadh","versions":[{"status":"affected","version":">= 4.1.0, < 6.1.0"}]}],"descriptions":[{"lang":"en","value":"listmonk is a standalone, self-hosted, newsletter and mailing list manager. From version 4.1.0 to before version 6.1.0, a session management vulnerability allows previously issued authenticated sessions to remain valid after sensitive account security changes, specifically password reset and password change. As a result, an attacker who has already obtained a valid session cookie can retain access to the account even after the victim changes or resets their password. This weakens account recovery and session security guarantees. This issue has been patched in version 6.1.0."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-613","description":"CWE-613: Insufficient Session Expiration","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-02T17:32:24.756Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/knadh/listmonk/security/advisories/GHSA-h5j9-cvrw-v5qh","tags":["x_refsource_CONFIRM"],"url":"https://github.com/knadh/listmonk/security/advisories/GHSA-h5j9-cvrw-v5qh"},{"name":"https://github.com/knadh/listmonk/commit/db82035d619348949512dafdaf60c86037cafc9e","tags":["x_refsource_MISC"],"url":"https://github.com/knadh/listmonk/commit/db82035d619348949512dafdaf60c86037cafc9e"},{"name":"https://github.com/knadh/listmonk/releases/tag/v6.1.0","tags":["x_refsource_MISC"],"url":"https://github.com/knadh/listmonk/releases/tag/v6.1.0"}],"source":{"advisory":"GHSA-h5j9-cvrw-v5qh","discovery":"UNKNOWN"},"title":"listmonk: Active sessions remain valid after password reset and password change"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-34828","datePublished":"2026-04-02T17:32:24.756Z","dateReserved":"2026-03-30T20:52:53.283Z","dateUpdated":"2026-04-02T17:32:24.756Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-02 18:16:33","lastModifiedDate":"2026-04-03 16:10:23","problem_types":["CWE-613","CWE-613 CWE-613: Insufficient Session Expiration"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":4.2}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"34828","Ordinal":"1","Title":"listmonk: Active sessions remain valid after password reset and ","CVE":"CVE-2026-34828","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"34828","Ordinal":"1","NoteData":"listmonk is a standalone, self-hosted, newsletter and mailing list manager. From version 4.1.0 to before version 6.1.0, a session management vulnerability allows previously issued authenticated sessions to remain valid after sensitive account security changes, specifically password reset and password change. As a result, an attacker who has already obtained a valid session cookie can retain access to the account even after the victim changes or resets their password. This weakens account recovery and session security guarantees. This issue has been patched in version 6.1.0.","Type":"Description","Title":"listmonk: Active sessions remain valid after password reset and "}]}}}