All versions of the package github.com/greenpau/caddy-security are vulnerable to Insufficient Session Expiration due to improper user session invalidation upon clicking the "Sign Out" button. User sessions remain valid even after requests are sent to /logout and /oauth2/google/logout. Attackers who gain access to an active but supposedly logged-out session can perform unauthorized actions on behalf of the user.
Metrics
Affected Vendors & Products
References
History
Tue, 23 Dec 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Authcrunch
Authcrunch caddy-security |
|
| CPEs | cpe:2.3:a:authcrunch:caddy-security:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Authcrunch
Authcrunch caddy-security |
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-12-06T18:30:09.279Z
Reserved: 2023-12-22T12:33:20.118Z
Link: CVE-2024-21492
Updated: 2024-08-01T22:20:40.830Z
Status : Analyzed
Published: 2024-02-17T05:15:08.223
Modified: 2025-12-23T20:15:15.333
Link: CVE-2024-21492
No data.
OpenCVE Enrichment
Updated: 2025-07-12T15:42:32Z