CVE-2026-2177
Published: 08 February 2026
Summary
CVE-2026-2177 is a high-severity Session Fixation (CWE-384) vulnerability in Fast5 Prison Management System. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 20.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Session termination after a set interval shortens the usable lifetime of a fixed session identifier, making successful exploitation of session fixation more difficult.
Re-authentication typically forces issuance of a new session, limiting the window for exploitation of a previously fixed session identifier.
Enforces proper session ID generation and binding, preventing fixation of a known session token.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Session fixation in a public-facing login component directly enables remote exploitation of the application (T1190) and use of a pre-set web session identifier as alternate authentication material to hijack a valid user session (T1550.004).
NVD Description
A vulnerability has been found in SourceCodester Prison Management System 1.0. The impacted element is an unknown function of the component Login. The manipulation leads to session fixiation. It is possible to initiate the attack remotely. The exploit has been…
more
disclosed to the public and may be used.
Deeper analysisAI
CVE-2026-2177 is a session fixation vulnerability (CWE-384) in an unknown function of the Login component within SourceCodester Prison Management System 1.0. Published on 2026-02-08, it carries a CVSS v3.1 base score of 7.3 (High), rated as AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L, indicating network accessibility with low attack complexity, no privileges or user interaction required, and low impacts across confidentiality, integrity, and availability.
The vulnerability enables remote exploitation where an attacker manipulates session handling during login, potentially allowing session hijacking if a victim authenticates using a pre-set session identifier controlled by the attacker. Unauthenticated attackers can initiate this remotely, achieving partial compromise of user sessions.
Advisories reference VulDB entries (ctiid.344880, id.344880, submit.749485) and a GitHub issue (https://github.com/hater-us/CVE/issues/10), noting that the exploit has been publicly disclosed and may be used. The vendor site (https://www.sourcecodester.com/) is listed for further details, though no specific patches or mitigations are outlined in the core description.
Details
- CWE(s)