Race condition in the turbo-frame element handler in Hotwired Turbo before 8.0.x causes logout operations to fail when delayed frame responses reapply session cookies after logout. This can be exploited by remote attackers via selective network delays (e.g. delaying requests based on sequence or timing) or by physically proximate attackers when the race condition occurs naturally on shared computers.
References
| Link | Resource |
|---|---|
| https://github.com/hotwired/turbo/pull/1399 | Exploit Issue Tracking Patch |
| https://github.com/hotwired/turbo/security/advisories/GHSA-qppm-g56g-fpvp | Vendor Advisory |
| https://turbo.hotwired.dev/handbook/frames | Product |
Configurations
History
No history.
Information
Published : 2026-01-20 19:15
Updated : 2026-01-30 20:03
NVD link : CVE-2025-66803
Mitre link : CVE-2025-66803
CVE.ORG link : CVE-2025-66803
JSON object : View
Products Affected
hotwired
- turbo
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
