Cyber Posture

CVE-2026-34828

HighPublic PoC

Published: 02 April 2026

Published
02 April 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0001 2.8th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-34828 is a high-severity Insufficient Session Expiration (CWE-613) vulnerability in Nadh Listmonk. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Web Session Cookie (T1550.004); ranked at the 2.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-12 (Session Termination) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Web Session Cookie (T1550.004). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires automatic termination of user sessions upon organization-defined trigger events such as password changes or resets, directly preventing persistent access via stale session cookies after account security actions.

prevent

Ensures timely remediation of the specific session management flaw through identification, reporting, and patching to version 6.1.0 or later, eliminating the vulnerability.

prevent

Mandates account management processes including disabling or reviewing access following credential changes like password resets, supporting mitigation of continued unauthorized session use.

MITRE ATT&CK Enterprise TechniquesAI

T1550.004 Web Session Cookie Lateral Movement
Adversaries can use stolen session cookies to authenticate to web applications and services.
Why these techniques?

The session management flaw (insufficient invalidation on password change) directly enables persistent use of obtained web session cookies for unauthorized access to the application account, bypassing expected termination.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

listmonk is a standalone, self-hosted, newsletter and mailing list manager. From version 4.1.0 to before version 6.1.0, a session management vulnerability allows previously issued authenticated sessions to remain valid after sensitive account security changes, specifically password reset and password change.…

more

As a result, an attacker who has already obtained a valid session cookie can retain access to the account even after the victim changes or resets their password. This weakens account recovery and session security guarantees. This issue has been patched in version 6.1.0.

Deeper analysisAI

CVE-2026-34828 is a session management vulnerability (CWE-613) affecting listmonk, a standalone, self-hosted newsletter and mailing list manager. The issue impacts versions from 4.1.0 up to but not including 6.1.0, where previously issued authenticated sessions remain valid even after sensitive account security changes such as password resets or password changes. This flaw undermines standard account recovery and session invalidation mechanisms, allowing persistent access via session cookies despite user-initiated security actions. The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N), indicating high confidentiality impact with low privileges required.

An authenticated attacker with low privileges (PR:L) who has obtained a valid session cookie can exploit this vulnerability over the network with low complexity and no user interaction. Upon exploitation, the attacker retains unauthorized access to the victim's account even after the victim performs a password reset or change, bypassing expected session termination. This enables continued high-level confidentiality breaches, such as accessing sensitive mailing list data, and limited integrity modifications, while availability remains unaffected.

The listmonk security advisory (GHSA-h5j9-cvrw-v5qh) and release notes for version 6.1.0 detail the patch, implemented via commit db82035d619348949512dafdaf60c86037cafc9e, which ensures sessions are properly invalidated upon password changes or resets. Security practitioners should upgrade affected listmonk instances to version 6.1.0 or later to mitigate the issue, and review existing sessions for potential compromise by logging out all users or implementing additional session controls where feasible.

Details

CWE(s)

Affected Products

nadh
listmonk
4.1.0 — 6.1.0

CVEs Like This One

CVE-2025-59786Shared CWE-613
CVE-2025-57735Shared CWE-613
CVE-2025-22386Shared CWE-613
CVE-2025-36377Shared CWE-613
CVE-2026-25476Shared CWE-613
CVE-2025-24973Shared CWE-613
CVE-2026-29092Shared CWE-613
CVE-2026-27649Shared CWE-613
CVE-2025-24896Shared CWE-613
CVE-2025-36376Shared CWE-613

References