Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-15553

Summary
Assigner-NCSC-FI
Assigner Org ID-db4dfee8-a97e-4877-bfae-eba6d14a2166
Published At-16 Mar, 2026 | 10:45
Updated At-16 Mar, 2026 | 18:01
Rejected At-
Credits

Insecure Logout Functionality in Truesec LAPSWebUI

Non-working logout functionality in Truesec’s LAPSWebUI before version 2.4 allows an attacker with access to a workstation to escalate their privileges via disclosure of local admin password.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:NCSC-FI
Assigner Org ID:db4dfee8-a97e-4877-bfae-eba6d14a2166
Published At:16 Mar, 2026 | 10:45
Updated At:16 Mar, 2026 | 18:01
Rejected At:
▼CVE Numbering Authority (CNA)
Insecure Logout Functionality in Truesec LAPSWebUI

Non-working logout functionality in Truesec’s LAPSWebUI before version 2.4 allows an attacker with access to a workstation to escalate their privileges via disclosure of local admin password.

Affected Products
Vendor
Truesec
Product
LAPSWebUI
Default Status
unaffected
Versions
Affected
  • From 0 before 2.4 (maven)
Unaffected
  • 2.4 (maven)
Problem Types
TypeCWE IDDescription
CWECWE-613CWE-613 Insufficient session expiration
Type: CWE
CWE ID: CWE-613
Description: CWE-613 Insufficient session expiration
Metrics
VersionBase scoreBase severityVector
4.06.0MEDIUM
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H
Version: 4.0
Base score: 6.0
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H
Metrics Other Info
Impacts
CAPEC IDDescription
N/AEscalation of Privileges
N/AInformation Disclosure
CAPEC ID: N/A
Description: Escalation of Privileges
CAPEC ID: N/A
Description: Information Disclosure
Solutions

Configurations

Workarounds

Configure LAPSWebUI to require Entra ID sign-in every time a user wants to display a password, by enabling the setting Force Reauth on Password request.

Exploits

Credits

finder
Laban Sköllermark at Reversec Sweden AB
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://labs.reversec.com/advisories/2026/03/insecure-logout-functionality-in-truesec-lapswebui
N/A
Hyperlink: https://labs.reversec.com/advisories/2026/03/insecure-logout-functionality-in-truesec-lapswebui
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:db4dfee8-a97e-4877-bfae-eba6d14a2166
Published At:16 Mar, 2026 | 14:17
Updated At:20 Apr, 2026 | 13:18

Non-working logout functionality in Truesec’s LAPSWebUI before version 2.4 allows an attacker with access to a workstation to escalate their privileges via disclosure of local admin password.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.06.0MEDIUM
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.17.1HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Type: Secondary
Version: 4.0
Base score: 6.0
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 7.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CPE Matches

truesec
truesec
>>lapswebui>>Versions before 2.4(exclusive)
cpe:2.3:a:truesec:lapswebui:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-613Secondarydb4dfee8-a97e-4877-bfae-eba6d14a2166
CWE ID: CWE-613
Type: Secondary
Source: db4dfee8-a97e-4877-bfae-eba6d14a2166
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://labs.reversec.com/advisories/2026/03/insecure-logout-functionality-in-truesec-lapswebuidb4dfee8-a97e-4877-bfae-eba6d14a2166
Third Party Advisory
Hyperlink: https://labs.reversec.com/advisories/2026/03/insecure-logout-functionality-in-truesec-lapswebui
Source: db4dfee8-a97e-4877-bfae-eba6d14a2166
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

7Records found

CVE-2025-15552
Matching Score-10
Assigner-National Cyber Security Centre Finland (NCSC-FI)
ShareView Details
Matching Score-10
Assigner-National Cyber Security Centre Finland (NCSC-FI)
CVSS Score-6||MEDIUM
EPSS-0.01% / 3.35%
||
7 Day CHG~0.00%
Published-16 Mar, 2026 | 10:44
Updated-20 Apr, 2026 | 13:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Long Session Lifetime in Truesec LAPSWebUI

Insufficient Session Expiration in Truesec’s LAPSWebUI before version 2.4 allows an attacker with access to a workstation to escalate their privileges via disclosure of local admin password.

Action-Not Available
Vendor-truesecTruesec
Product-lapswebuiLAPSWebUI
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2025-15554
Matching Score-8
Assigner-National Cyber Security Centre Finland (NCSC-FI)
ShareView Details
Matching Score-8
Assigner-National Cyber Security Centre Finland (NCSC-FI)
CVSS Score-6||MEDIUM
EPSS-0.02% / 4.04%
||
7 Day CHG~0.00%
Published-16 Mar, 2026 | 10:46
Updated-07 Apr, 2026 | 00:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Admin Passwords Cached by Browsers in Truesec LAPSWebUI

Browser caching of LAPS passwords in Truesec’s LAPSWebUI before version 2.4 allows an attacker with access to a workstation to escalate their privileges via disclosure of local admin passwords.

Action-Not Available
Vendor-truesecTruesec
Product-lapswebuiLAPSWebUI
CWE ID-CWE-525
Use of Web Browser Cache Containing Sensitive Information
CVE-2020-5774
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-7.1||HIGH
EPSS-0.04% / 13.46%
||
7 Day CHG~0.00%
Published-21 Aug, 2020 | 12:23
Updated-04 Aug, 2024 | 08:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Nessus versions 8.11.0 and earlier were found to maintain sessions longer than the permitted period in certain scenarios. The lack of proper session expiration could allow attackers with local access to login into an existing browser session.

Action-Not Available
Vendor-n/aTenable, Inc.
Product-nessusTenable Nessus
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2025-59335
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.1||HIGH
EPSS-0.02% / 4.24%
||
7 Day CHG~0.00%
Published-22 Sep, 2025 | 16:13
Updated-23 Sep, 2025 | 16:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CubeCart Session Not Invalidated After Password Change

CubeCart is an ecommerce software solution. Prior to version 6.5.11, there is an absence of automatic session expiration following a user's password change. This oversight poses a security risk, as if a user forgets to log out from a location where they accessed their account, an unauthorized user can maintain access even after the password has been changed. Due to this bug, if an account has already been compromised, the legitimate user has no way to revoke the attacker’s access. The malicious actor retains full access to the account until their session naturally expires. This means the account remains insecure even after the password has been changed. This issue has been patched in version 6.5.11.

Action-Not Available
Vendor-cubecartcubecart
Product-cubecartv6
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2025-53896
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.1||HIGH
EPSS-0.03% / 7.34%
||
7 Day CHG~0.00%
Published-29 Nov, 2025 | 02:24
Updated-03 Dec, 2025 | 15:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kiteworks MFT is vulnerable to Insufficient Session Expiration

Kiteworks MFT orchestrates end-to-end file transfer workflows. Prior to version 9.1.0, a bug in Kiteworks MFT could cause under certain circumstances that a user's active session would not properly time out due to inactivity. This issue has been patched in version 9.1.0.

Action-Not Available
Vendor-kiteworksAccellion (Kiteworks USA, LLC)
Product-kiteworks_managed_file_transfersecurity-advisories
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2020-10709
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.1||HIGH
EPSS-0.04% / 11.33%
||
7 Day CHG~0.00%
Published-27 May, 2021 | 18:46
Updated-04 Aug, 2024 | 11:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A security flaw was found in Ansible Tower when requesting an OAuth2 token with an OAuth2 application. Ansible Tower uses the token to provide authentication. This flaw allows an attacker to obtain a refresh token that does not expire. The original token granted to the user still has access to Ansible Tower, which allows any user that can gain access to the token to be fully authenticated to Ansible Tower. This flaw affects Ansible Tower versions before 3.6.4 and Ansible Tower versions before 3.5.6.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-ansible_towerTower
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2019-5647
Matching Score-4
Assigner-Rapid7, Inc.
ShareView Details
Matching Score-4
Assigner-Rapid7, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.12% / 30.00%
||
7 Day CHG~0.00%
Published-22 Jan, 2020 | 18:00
Updated-17 Sep, 2024 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rapid7 AppSpider Chrome Plugin Insufficient Session Expiration

The Chrome Plugin for Rapid7 AppSpider can incorrectly keep browser sessions active after recording a macro, even after a restart of the Chrome browser. This behavior could make future session hijacking attempts easier, since the user could believe a session was closed when it was not. This issue affects Rapid7 AppSpider version 3.8.213 and prior versions, and is fixed in version 3.8.215.

Action-Not Available
Vendor-Rapid7 LLC
Product-appspiderAppSpider
CWE ID-CWE-613
Insufficient Session Expiration
Details not found