CVE-2026-29092
Published: 25 March 2026
Summary
CVE-2026-29092 is a medium-severity Insufficient Session Expiration (CWE-613) vulnerability in Accellion Kiteworks. Its CVSS base score is 4.9 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Valid Accounts (T1078); ranked at the 14.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-12 (Session Termination) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Mandates automatic termination of user sessions upon organization-defined trigger events such as account disablement, directly preventing continued unauthorized access after blocking.
Requires timely disablement and management of user accounts, which supports invalidation of associated sessions to mitigate persistent access post-disablement.
Ensures identification, reporting, and correction of flaws like insufficient session expiration through timely patching, as recommended for this CVE.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Directly enables continued abuse of disabled high-priv accounts via still-valid web sessions (T1078 Valid Accounts + T1550.004 Web Session Cookie).
NVD Description
Kiteworks is a private data network (PDN). Prior to version 9.2.1, a vulnerability in Kiteworks Email Protection Gateway session management allows blocked users to maintain active sessions after their account is disabled. This could allow unauthorized access to continue until…
more
the session naturally expires. Upgrade Kiteworks to version 9.2.1 or later to receive a patch.
Deeper analysisAI
CVE-2026-29092 is a session management vulnerability in the Kiteworks Email Protection Gateway component of Kiteworks, a private data network (PDN). Prior to version 9.2.1, the flaw allows users whose accounts have been blocked or disabled to retain active sessions, enabling continued access until the sessions naturally expire. The vulnerability is classified under CWE-613 (Insufficient Session Expiration) with a CVSS v3.1 base score of 4.9 (AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N), indicating network accessibility, low attack complexity, and high-privilege requirements but primarily impacting integrity.
Exploitation requires high privileges (PR:H), targeting authenticated users with administrative or elevated roles whose accounts are subsequently disabled. An attacker with such an account could maintain unauthorized access to Kiteworks resources post-disablement, potentially performing integrity-modifying actions like altering data or configurations until session timeouts occur, without needing user interaction or affecting confidentiality or availability.
The Kiteworks security advisory recommends upgrading to version 9.2.1 or later, where the patch addresses the session invalidation issue upon account disablement. Additional details are available in the GitHub Security Advisory at https://github.com/kiteworks/security-advisories/security/advisories/GHSA-92w7-fpjr-wpxc.
Details
- CWE(s)