CVE-2025-15552
Published: 16 March 2026
Summary
CVE-2025-15552 is a high-severity Insufficient Session Expiration (CWE-613) vulnerability in Truesec Lapswebui. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Unsecured Credentials (T1552); ranked at the 3.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-12 (Session Termination) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses insufficient session expiration by enforcing automatic termination of user sessions after defined inactivity periods, preventing unauthorized access to persistent LAPSWebUI sessions.
Requires timely remediation of the specific flaw in LAPSWebUI prior to version 2.4 via upgrade, eliminating the vulnerability at its source.
Initiates device lock after inactivity on the workstation, blocking local attackers from accessing and exploiting non-expired sessions in the web UI.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Insufficient session expiration directly exposes LAPS credentials (T1552), enabling local low-priv attacker to obtain local admin password and escalate privileges (T1068, T1078.003).
NVD Description
Insufficient Session Expiration in Truesec’s LAPSWebUI before version 2.4 allows an attacker with access to a workstation to escalate their privileges via disclosure of local admin password.
Deeper analysisAI
CVE-2025-15552 is an Insufficient Session Expiration vulnerability (CWE-613) in Truesec’s LAPSWebUI prior to version 2.4. Published on 2026-03-16T14:17:56.130, it carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The flaw stems from sessions that do not expire properly, enabling unauthorized access to sensitive credentials within the LAPS (Local Administrator Password Solution) web interface.
A local attacker with access to an affected workstation and low privileges can exploit this vulnerability with low attack complexity and no user interaction. Exploitation allows disclosure of the local administrator password, resulting in privilege escalation and high impacts on confidentiality, integrity, and availability.
The advisory at https://labs.reversec.com/advisories/2026/03/long-session-lifetime-in-truesec-lapswebui provides details on the issue, with mitigation achieved by upgrading to LAPSWebUI version 2.4 or later.
Details
- CWE(s)