CVE-2018-1000814:
aiohttp-session creates non-expiring sessions
6.5
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
12/20/2018
Updated
3/14/2025
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
aiohttp-session | pip | <= 2.6.0 | 2.7.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper session expiration handling in the Session constructor. The pre-patch code in aiohttp_session/init.py didn't compare session age against max_age during initialization, allowing attackers to reuse expired cookies. The fix added an age check that nullifies session data when max_age is exceeded. This matches the CWE-613 description of insufficient session expiration and aligns with the commit diff showing the vulnerability was addressed in the Session initialization logic.