CKAN vulnerable to fixed session IDs
Package
Affected versions
>= 2.10.0, < 2.10.9
>= 2.11.0, < 2.11.4
Patched versions
2.10.9
2.11.4
Description
Published by the National Vulnerability Database
Oct 29, 2025
Published to the GitHub Advisory Database
Oct 29, 2025
Reviewed
Oct 29, 2025
Last updated
Oct 29, 2025
Impact
Session ids could be fixed by an attacker if the site is configured with server-side session storage (CKAN uses cookie-based session storage by default). The attacker would need to either set a cookie on the victim's browser or steal the victim's currently valid session. Session identifiers are now regenerated after each login.
Patches
This vulnerability has been fixed in CKAN 2.10.9 and 2.11.4
References
https://en.wikipedia.org/wiki/Session_fixation
References