Miggo Logo

CVE-2025-27794:
Flarum Vulnerable to Session Hijacking via Authoritative Subdomain Cookie Overwrite

6.8

CVSS Score

Basic Information

EPSS Score
-
Published
3/12/2025
Updated
3/12/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
flarum/corecomposer< 1.8.101.8.10
flarum/frameworkcomposer< 1.8.101.8.10

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing session token rotation after authentication. The commit diff shows the original code in RememberFromCookie.php directly set the session token ($session->put('access_token', $token->token)) without checking for existing sessions or invalidating prior tokens. This allowed attackers to overwrite cookies at the parent domain level and hijack sessions. The patched version adds token comparison, session invalidation, and token regeneration - confirming this was the vulnerable function. The middleware's role in cookie-based authentication directly aligns with the session hijacking mechanism described in the advisory.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## **Summ*ry** * s*ssion *ij**kin* vuln*r**ility *xists w**n *n *tt**k*r-*ontroll** ***ut*orit*tiv* su**om*in** un**r * p*r*nt *om*in (*.*., `su**om*in.*ost.*om`) s*ts *ooki*s s*op** to t** p*r*nt *om*in (`.*ost.*om`). T*is *llows s*ssion tok*n r*p

Reasoning

T** vuln*r**ility st*ms *rom missin* s*ssion tok*n rot*tion **t*r *ut**nti**tion. T** *ommit *i** s*ows t** ori*in*l *o** in R*m*m**r*rom*ooki*.p*p *ir**tly s*t t** s*ssion tok*n ($s*ssion->put('****ss_tok*n', $tok*n->tok*n)) wit*out ****kin* *or *xi