CVE-2025-64100: CKAN vulnerable to fixed session IDs
Session ids could be fixed by an attacker if the site is configured with server-side session storage (CKAN uses cookie-based session storage by default). The attacker would need to either set a cookie on the victim’s browser or steal the victim’s currently valid session. Session identifiers are now regenerated after each login.
References
Code Behaviors & Features
Detect and mitigate CVE-2025-64100 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →