CVE-2025-62781

5.0 MEDIUM

📋 TL;DR

This vulnerability allows attackers with stolen session tokens to maintain access to PILOS accounts even after users change their passwords. It affects PILOS (Platform for Interactive Live-Online Seminars) users with local accounts. The issue occurs because password changes don't invalidate the current active session token.

💻 Affected Systems

Products:
  • PILOS (Platform for Interactive Live-Online Seminars)
Versions: All versions prior to 4.8.0
Operating Systems: Any OS running PILOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects users with local PILOS accounts (not external authentication). Requires attacker to have obtained session token through other means first.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers maintain persistent unauthorized access to user accounts, potentially accessing sensitive seminar data, recordings, or conducting unauthorized actions as legitimate users.

🟠

Likely Case

Attackers who previously obtained session tokens through other vulnerabilities can continue accessing compromised accounts despite password resets.

🟢

If Mitigated

With proper session management and token invalidation, attackers lose access immediately upon password changes.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires attacker to first obtain valid session token through other vulnerabilities or attacks. Password change must occur while attacker has active stolen session.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.8.0

Vendor Advisory: https://github.com/THM-Health/PILOS/security/advisories/GHSA-m8w5-8w3h-72wm

Restart Required: No

Instructions:

1. Backup current PILOS installation and database. 2. Update PILOS to version 4.8.0 or later. 3. Verify the update completed successfully. 4. Test password change functionality to ensure sessions are properly invalidated.

🔧 Temporary Workarounds

Force session termination on password change

all

Manually invalidate all active sessions when users change passwords by clearing session tokens

Requires code modification to PILOS session management

Implement session timeout policies

all

Reduce session lifetime to limit window for token misuse

Configure PILOS session timeout settings

🧯 If You Can't Patch

  • Monitor for suspicious account activity and force logout all sessions for users who change passwords
  • Implement additional authentication factors for sensitive operations

🔍 How to Verify

Check if Vulnerable:

Test if changing password while logged in from multiple devices allows old sessions to remain active

Check Version:

Check PILOS version in admin interface or configuration files

Verify Fix Applied:

After updating to 4.8.0+, verify that password changes invalidate all active sessions including the current one

📡 Detection & Monitoring

Log Indicators:

  • Multiple active sessions for same user after password change
  • User account activity from unusual locations/times

Network Indicators:

  • Session tokens being reused after password reset events

SIEM Query:

Search for password_change events followed by continued session activity from old tokens

🔗 References

📤 Share & Export