CVE-2022-2306: Insufficient Session Expiration in Nakama
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.46705%
CWE
Published
7/6/2022
Updated
1/27/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/heroiclabs/nakama | go | <= 3.12.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from insufficient session expiration during logout. The GitHub commit added a new AuthenticateLogout RPC endpoint and session cache cleanup, indicating that previous versions lacked proper token invalidation. The core issue was in session validation logic (console_authenticate.go) that didn't check for explicit invalidation, and session cache management (session_cache.go) that retained tokens after logout. These functions together allowed old tokens to remain valid indefinitely.