Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/OliveTin/OliveTin
  4. ›
  5. CVE-2026-30224

CVE-2026-30224: OliveTin Session Fixation: Logout Fails to Invalidate Server-Side Session

March 5, 2026 (updated March 6, 2026)

OliveTin does not revoke server-side sessions when a user logs out. Although the browser cookie is cleared, the corresponding session remains valid in server storage until expiry (default ≈ 1 year).

An attacker with a previously stolen or captured session cookie can continue authenticating after logout, resulting in a post-logout authentication bypass.

This is a session management flaw that violates expected logout semantics.

References

  • github.com/OliveTin/OliveTin
  • github.com/OliveTin/OliveTin/commit/d6a0abc3755d43107be1939567c52953bcbec3d5
  • github.com/OliveTin/OliveTin/releases/tag/3000.11.1
  • github.com/OliveTin/OliveTin/security/advisories/GHSA-gq2m-77hf-vwgh
  • github.com/advisories/GHSA-gq2m-77hf-vwgh
  • nvd.nist.gov/vuln/detail/CVE-2026-30224

Code Behaviors & Features

Detect and mitigate CVE-2026-30224 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.0.0-20260304233115-d6a0abc3755d15

Fixed versions

  • 0.0.0-20260304233115-d6a0abc3755d15

Solution

Upgrade to version 0.0.0-20260304233115-d6a0abc3755d15 or above.

Impact 5.4 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-384: Session Fixation
  • CWE-613: Insufficient Session Expiration

Source file

go/github.com/OliveTin/OliveTin/CVE-2026-30224.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 16 May 2026 00:17:45 +0000.