CVE-2025-35433
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-17

Last updated on: 2025-09-23

Assigner: Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government

Description
CISA Thorium does not properly invalidate previously used tokens when resetting passwords. An attacker that possesses a previously used token could still log in after a password reset. Fixed in 1.1.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-17
Last Modified
2025-09-23
Generated
2026-04-23
AI Q&A
2025-09-17
EPSS Evaluated
2026-04-22
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
cisa thorium 1.1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-613 According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs because CISA Thorium does not properly invalidate previously used tokens when a user resets their password. As a result, an attacker who has access to a previously used token can still log in even after the password has been changed. This issue was fixed in version 1.1.1.


How can this vulnerability impact me? :

The vulnerability can allow an attacker to maintain unauthorized access to an account even after the legitimate user resets their password. This could lead to continued unauthorized access, potential data exposure, or misuse of the compromised account.


What immediate steps should I take to mitigate this vulnerability?

The immediate step to mitigate this vulnerability is to upgrade CISA Thorium to version 1.1.1 or later, where the issue with token invalidation after password reset has been fixed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart