Instead of typical session tokens or cookies, it is verified on a per-request basis if the originating IP address has once successfully logged in. As soon as an authentication request from a certain source IP is successful, the IP address is handled as authenticated. No other session information is stored. Therefore, it is possible to spoof the IP address of a logged-in user to gain access to the Access Manager web interface.
History

Mon, 26 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
Description Instead of typical session tokens or cookies, it is verified on a per-request basis if the originating IP address has once successfully logged in. As soon as an authentication request from a certain source IP is successful, the IP address is handled as authenticated. No other session information is stored. Therefore, it is possible to spoof the IP address of a logged-in user to gain access to the Access Manager web interface.
Title Insufficient Session Management in dormakaba access manager
Weaknesses CWE-291
References
Metrics cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2026-01-26T10:05:20.665Z

Reserved: 2025-09-09T07:53:12.879Z

Link: CVE-2025-59101

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-26T10:16:07.850

Modified: 2026-01-26T10:16:07.850

Link: CVE-2025-59101

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.