PT-2025-35200 · Pyload · Pyload

Arkadiusz Marta

·

Published

2025-08-29

·

Updated

2025-08-29

·

CVE-2025-4643

CVSS v4.0
6.3
VectorAV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Name of the Vulnerable Software and Affected Versions:

Payload versions prior to 3.44.0

Description:

Payload utilizes JSON Web Tokens (JWT) for authentication. Following a user logout, the JWT is not invalidated, enabling an attacker who has obtained a valid token—through theft or interception—to reuse it until its expiration date. The default expiration date is two hours, but this duration is configurable.

Recommendations:

Update to version 3.44.0 or later.

Fix

Insufficient Session Expiration

Session Fixation

Weakness Enumeration

Related Identifiers

CVE-2025-4643
GHSA-26RV-H2HF-3FW4
GHSA-5V66-M237-HWF7

Affected Products

Pyload