CVE-2025-34412
Session Management and HTTP Header Misconfigurations in Convercent Platform
Publication date: 2025-12-15
Last updated on: 2025-12-15
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| eqs | convercent_whistleblowing_platform | 4.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-693 | The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Convercent Whistleblowing Platform involves a failure in protection mechanisms related to browser and session handling. By default, affected deployments omit important HTTP security headers such as Content-Security-Policy, Referrer-Policy, Permissions-Policy, and several cross-origin policies. The platform also has incomplete clickjacking protections. Additionally, session cookies are issued with insecure or inconsistent attributes, including duplicate ASP.NET_SessionId cookies, an affinity cookie missing the Secure attribute, and mixed or absent SameSite settings. These issues weaken browser-side isolation and session integrity, increasing the risk of client-side attacks like session fixation and cross-site session leakage. [2]
How can this vulnerability impact me? :
The vulnerability can impact you by increasing exposure to client-side attacks such as session fixation and cross-site session leakage. Because of missing security headers and insecure session cookie attributes, attackers may exploit these weaknesses to hijack user sessions, bypass browser security policies, or perform clickjacking attacks. This can lead to unauthorized access to sensitive information or actions within the platform. [2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability involves checking for missing or incomplete HTTP security headers and inspecting session cookies for insecure or inconsistent attributes. You can use tools like curl or browser developer tools to inspect HTTP headers and cookies. For example, use the command: curl -I https://your-convercent-platform-url to view HTTP headers and verify the presence of Content-Security-Policy, Referrer-Policy, Permissions-Policy, Cross-Origin-Embedder-Policy, Cross-Origin-Opener-Policy, and Cross-Origin-Resource-Policy headers. Additionally, inspect cookies for duplicate ASP.NET_SessionId values, missing Secure attribute on affinity cookies, and inconsistent SameSite settings. Browser developer tools or automated security scanners can assist in this inspection. [2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include configuring the Convercent Whistleblowing Platform to implement the missing HTTP security headers such as Content-Security-Policy, Referrer-Policy, Permissions-Policy, Cross-Origin-Embedder-Policy, Cross-Origin-Opener-Policy, and Cross-Origin-Resource-Policy. Also, ensure complete clickjacking protections are in place. Review and correct session cookie attributes by removing duplicate ASP.NET_SessionId cookies, adding the Secure attribute to affinity cookies, and setting consistent SameSite attributes. These actions will strengthen browser-side isolation and session integrity, reducing exposure to client-side attacks, session fixation, and cross-site session leakage. [2]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability weakens browser-side isolation and session integrity by omitting critical HTTP security headers and issuing insecure session cookies by default. This increases exposure to client-side attacks such as session fixation and cross-site session leakage, which can lead to unauthorized access or data breaches. Such security weaknesses can negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require adequate protection of personal and sensitive data to prevent unauthorized disclosure or compromise. [2]