aio-libs aiohttp-session contains a Session Fixation vulnerability in load_session function for RedisStorage (see: https://github.com/aio-libs/aiohttp-session/blob/master/aiohttp_session/redis_storage.py#L42) that can result in Session Hijacking. This attack appear to be exploitable via Any method that allows setting session cookies (?session=<>, or meta tags or script tags with Set-Cookie).
Metrics
Affected Vendors & Products
References
History
Sat, 12 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Fri, 11 Jul 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Aio-libs
Aio-libs aiohttp Session |
|
CPEs | cpe:2.3:a:aio-libs:aiohttp_session:*:*:*:*:*:*:*:* | |
Vendors & Products |
Aio-libs Project
Aio-libs Project aiohttp |
Aio-libs
Aio-libs aiohttp Session |
Metrics |
cvssV3_0
|
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published: 2018-06-26T16:00:00
Updated: 2024-08-05T12:40:47.085Z
Reserved: 2018-04-30T00:00:00
Link: CVE-2018-1000519

No data.

Status : Analyzed
Published: 2018-06-26T16:29:01.307
Modified: 2025-07-11T20:06:08.070
Link: CVE-2018-1000519

No data.