CVE-2025-24896
📋 TL;DR
Misskey versions 12.109.0 through 2025.2.0-alpha.0 fail to delete authentication tokens from cookies after logout, allowing session persistence. This primarily affects users who log in from shared or public computers, potentially enabling unauthorized access to their accounts even after they've logged out.
💻 Affected Systems
- Misskey
📦 What is this software?
Misskey by Misskey
⚠️ Risk & Real-World Impact
Worst Case
An attacker gains unauthorized access to a user's Misskey account on a shared device, potentially compromising private messages, administrative functions, and federated social media interactions.
Likely Case
Subsequent users of a shared computer could access the previous user's Misskey session, viewing private content and performing actions as that user.
If Mitigated
With proper session management controls and user awareness, the risk is limited to specific shared device scenarios.
🎯 Exploit Status
Exploitation requires physical or remote access to a device where a user previously logged in and didn't clear cookies manually.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2025.2.0-alpha.0
Vendor Advisory: https://github.com/misskey-dev/misskey/security/advisories/GHSA-w98m-j6hq-cwjm
Restart Required: No
Instructions:
1. Update Misskey to version 2025.2.0-alpha.0 or later. 2. Apply the commit ba9f295ef2bf31cc90fa587e20b9a7655b7a1824 if manually patching. 3. No restart required for the fix to take effect.
🔧 Temporary Workarounds
Manual Cookie Deletion
allUsers should manually clear browser cookies after logging out from shared devices.
Disable Bull Dashboard
allTemporarily disable Bull Dashboard if not required, reducing the attack surface.
🧯 If You Can't Patch
- Implement strict access controls on shared devices and enforce manual cookie clearing policies.
- Monitor authentication logs for unusual session activity and implement alerting for multiple logins from the same device.
🔍 How to Verify
Check if Vulnerable:
Check if the Misskey version is between 12.109.0 and 2025.2.0-alpha.0 (exclusive) and Bull Dashboard is enabled.
Check Version:
Check the Misskey instance's version via admin panel or API endpoint.
Verify Fix Applied:
After updating, verify that the 'token' cookie is properly deleted upon logout by inspecting browser cookies.
📡 Detection & Monitoring
Log Indicators:
- Multiple successful logins from the same device/IP without fresh authentication
- Session tokens persisting beyond logout events
Network Indicators:
- Unauthorized requests using previously valid session tokens
SIEM Query:
source="misskey" AND (event="login" OR event="logout") | stats count by user, device_id | where count > 1