CVE-2025-64100: CKAN vulnerable to fixed session IDs
6.1
Basic Information
Technical Details
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| ckan | pip | >= 2.10.0, < 2.10.9 | 2.10.9 |
| ckan | pip | >= 2.11.0, < 2.11.4 | 2.11.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability described is a session fixation issue in CKAN, where session identifiers were not regenerated after a user logs in. This could allow an attacker to hijack a user's session. The provided commit c2fe437f88be850a6edf7a32470772428819fab5 directly addresses this vulnerability. The patch modifies the login function in ckan/views/user.py to explicitly regenerate the session after successful authentication by calling current_app.session_interface.regenerate(session). The absence of this session regeneration logic in the login function is the root cause of the vulnerability. Therefore, the login function is the vulnerable function that would be observed in a runtime profile when the vulnerability is exploited (i.e., when a user logs in with a fixated session ID).
Vulnerable functions
loginckan/views/user.py