authentik is an open-source identity provider. Prior to versions 2024.12.4 and 2025.2.3, when authentik was configured to use the database for session storage (which is a non-default setting), deleting sessions via the Web Interface or the API would not revoke the session and the session holder would continue to have access to authentik. authentik 2025.2.3 and 2024.12.4 fix this issue. Switching to the cache-based session storage until the authentik instance can be upgraded is recommended. This will however also delete all existing sessions and users will have to re-authenticate.
Metrics
Affected Vendors & Products
References
History
Fri, 28 Mar 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 28 Mar 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | authentik is an open-source identity provider. Prior to versions 2024.12.4 and 2025.2.3, when authentik was configured to use the database for session storage (which is a non-default setting), deleting sessions via the Web Interface or the API would not revoke the session and the session holder would continue to have access to authentik. authentik 2025.2.3 and 2024.12.4 fix this issue. Switching to the cache-based session storage until the authentik instance can be upgraded is recommended. This will however also delete all existing sessions and users will have to re-authenticate. | |
Title | authentik's deletion of sessions did not revoke sessions when using database session storage | |
Weaknesses | CWE-384 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-28T15:41:39.773Z
Reserved: 2025-03-12T13:42:22.136Z
Link: CVE-2025-29928

Updated: 2025-03-28T15:41:33.576Z

Status : Awaiting Analysis
Published: 2025-03-28T15:15:49.587
Modified: 2025-03-28T18:11:40.180
Link: CVE-2025-29928

No data.