关键漏洞信息 漏洞标题 Improper Session Handling Allows Access After Logout 严重性 Critical (CVSS v3 base metrics: 9.8/10) 影响版本 Affected versions: 2.2.0 Patched versions: 2.3.1 描述 FlagForge web application improperly handles session invalidation. Authenticated users can continue to access protected endpoints, such as /api/profile, even after logging out. CSRF tokens are also still valid post-logout, which can allow unauthorized actions. 影响 Type: Improper Session Handling Impacted Users: All authenticated users Potential consequences: - Unauthorized access to sensitive user data after logout - Session hijacking if tokens are stolen - CSRF attacks may be possible due to reusable CSRF tokens 修复措施 The issue should be patched by invalidating session tokens immediately upon logout and ensuring that CSRF tokens are also rotated. Users should upgrade to the version that contains this fix (to be specified once deployed). 权宜之计 As a temporary measure, users should manually clear cookies associated with __Secure-next-auth.session-token and __Host-next-auth.csrf-token after logging out. 参考资料 Session Management Cheat Sheet NextAuth.js Security 其他信息 CVE ID: CVE-2025-59841 Weaknesses: CWE-384, CWE-613 Reporter: aryan4859