CVE-2025-35433
BaseFortify
Publication date: 2025-09-17
Last updated on: 2025-09-23
Assigner: Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cisa | thorium | 1.1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-613 | According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization." |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs because CISA Thorium does not properly invalidate previously used tokens when a user resets their password. As a result, an attacker who has access to a previously used token can still log in even after the password has been changed. This issue was fixed in version 1.1.1.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to maintain unauthorized access to an account even after the legitimate user resets their password. This could lead to continued unauthorized access, potential data exposure, or misuse of the compromised account.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to upgrade CISA Thorium to version 1.1.1 or later, where the issue with token invalidation after password reset has been fixed.