{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T08:43:34.598","vulnerabilities":[{"cve":{"id":"CVE-2026-30224","sourceIdentifier":"security-advisories@github.com","published":"2026-03-06T21:16:16.280","lastModified":"2026-03-12T15:57:33.710","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.11.1, OliveTin does not revoke server-side sessions when a user logs out. Although the browser cookie is cleared, the corresponding session remains valid in server storage until expiry (default ≈ 1 year). An attacker with a previously stolen or captured session cookie can continue authenticating after logout, resulting in a post-logout authentication bypass. This is a session management flaw that violates expected logout semantics. This issue has been patched in version 3000.11.1."},{"lang":"es","value":"OliveTin da acceso a comandos shell predefinidos desde una interfaz web. Antes de la versión 3000.11.1, OliveTin no revoca las sesiones del lado del servidor cuando un usuario cierra sesión. Aunque la cookie del navegador se borra, la sesión correspondiente permanece válida en el almacenamiento del servidor hasta su caducidad (por defecto ? 1 año). Un atacante con una cookie de sesión previamente robada o capturada puede continuar autenticándose después de cerrar sesión, lo que resulta en una omisión de autenticación posterior al cierre de sesión. Esto es una falla de gestión de sesiones que viola la semántica esperada del cierre de sesión. Este problema ha sido parcheado en la versión 3000.11.1."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-384"},{"lang":"en","value":"CWE-613"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:olivetin:olivetin:*:*:*:*:*:*:*:*","versionEndExcluding":"3000.11.1","matchCriteriaId":"36F31F34-F899-413C-9A07-C14E32C66807"}]}]}],"references":[{"url":"https://github.com/OliveTin/OliveTin/commit/d6a0abc3755d43107be1939567c52953bcbec3d5","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/OliveTin/OliveTin/releases/tag/3000.11.1","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/OliveTin/OliveTin/security/advisories/GHSA-gq2m-77hf-vwgh","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}