A session fixation vulnerability exists in the zenml-io/zenml application, where JWT tokens used for user authentication are not invalidated upon logout. This flaw allows an attacker to bypass authentication mechanisms by reusing a victim's JWT token.
Metrics
Affected Vendors & Products
References
History
Fri, 13 Jun 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zenml
Zenml zenml |
|
| CPEs | cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Zenml
Zenml zenml |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-04-16T00:00:14.951Z
Updated: 2024-08-01T19:03:39.351Z
Reserved: 2024-03-07T11:52:54.353Z
Link: CVE-2024-2260
Updated: 2024-08-01T19:03:39.351Z
Status : Analyzed
Published: 2024-04-16T00:15:11.237
Modified: 2025-06-12T23:48:17.817
Link: CVE-2024-2260
No data.
ReportizFlow