Nagios Fusion v2024R1.2 and v2024R2 does not invalidate already existing session tokens when the two-factor authentication mechanism is enabled, allowing attackers to perform a session hijacking attack.
References
| Link | Resource |
|---|---|
| https://github.com/aakashtyal/Session-Persistence-After-Enabling-2FA | Mitigation Third Party Advisory |
| https://github.com/aakashtyal/Session-Persistence-After-Enabling-2FA-CVE-2025-60425 | Mitigation Third Party Advisory |
| https://www.nagios.com/changelog/#fusion | Release Notes |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-10-27 16:15
Updated : 2025-11-05 20:55
NVD link : CVE-2025-60425
Mitre link : CVE-2025-60425
CVE.ORG link : CVE-2025-60425
JSON object : View
Products Affected
nagios
- fusion
CWE
CWE-491
Public cloneable() Method Without Final ('Object Hijack')
