CVE-2025-48061

5.6 MEDIUM

📋 TL;DR

A session invalidation vulnerability in Wire webapp allows users who logged out to be automatically logged back in when reopening the application. This affects all Wire webapp users who don't use temporary sessions or delete personal information upon logout. The issue stems from improper session cleanup after logout.

💻 Affected Systems

Products:
  • wire-webapp
Versions: All versions before 2025-05-20-production.0
Operating Systems: All platforms running Wire webapp
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects standard login sessions. Temporary sessions ("This is a public computer") and sessions where users select "Delete all your personal information and conversations on this device" upon logout are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access to a shared computer could gain unauthorized access to a user's Wire account and conversations after the legitimate user logged out.

🟠

Likely Case

Users on shared or public computers inadvertently leaving their sessions accessible to subsequent users, potentially exposing private conversations.

🟢

If Mitigated

No impact when using temporary sessions or deleting personal information upon logout as described in the workaround.

🌐 Internet-Facing: MEDIUM - Web applications are internet-facing, but exploitation requires physical access or malware on the client device.
🏢 Internal Only: MEDIUM - Similar risk internally for shared workstations, though internal environments may have better access controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simply reopening the application triggers the issue.

Exploitation requires access to the same device where the user previously logged in and didn't use protective measures.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025-05-20-production.0

Vendor Advisory: https://github.com/wireapp/wire-webapp/security/advisories/GHSA-7r6m-qjwm-w44q

Restart Required: Yes

Instructions:

1. Update wire-webapp to version 2025-05-20-production.0 or later. 2. Restart the application. 3. Verify the fix by testing logout and reopening behavior.

🔧 Temporary Workarounds

Use temporary sessions

all

Select "This is a public computer" during login to create a temporary session that doesn't persist improperly.

Delete personal information upon logout

all

Always select "Delete all your personal information and conversations on this device" when logging out.

🧯 If You Can't Patch

  • Enforce policy requiring users on shared devices to always use temporary sessions or delete personal information upon logout.
  • Implement device session timeouts and mandatory re-authentication for sensitive operations.

🔍 How to Verify

Check if Vulnerable:

1. Log into Wire webapp on a test device. 2. Log out normally (without selecting delete option). 3. Close and reopen the application. 4. If automatically logged back in, the system is vulnerable.

Check Version:

Check the application version in settings or about page, or inspect the web application source for version information.

Verify Fix Applied:

Repeat the vulnerable check steps after patching. The application should not automatically log you in after logout.

📡 Detection & Monitoring

Log Indicators:

  • Multiple successful logins from same user/session ID in quick succession without explicit login events
  • Session tokens persisting beyond logout events

Network Indicators:

  • Unusual authentication patterns where sessions resume without fresh credentials

SIEM Query:

source="wire-webapp" AND (event="login" OR event="session_resume") | stats count by user, session_id, _time | where count > 1 within 5 minutes

🔗 References

📤 Share & Export