a valid session cookie access to privileged endpoints (such as /admin) even after the legitimate user has logged out, enabling session hijacking. Any version above 4.70 that is not 4.80.3 fixes the vulnerability.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 19 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:nopcommerce:nopcommerce:*:*:*:*:*:*:*:* cpe:2.3:a:nopcommerce:nopcommerce:4.80.3:*:*:*:*:*:*:* |
Mon, 01 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nopcommerce
Nopcommerce nopcommerce |
|
| Vendors & Products |
Nopcommerce
Nopcommerce nopcommerce |
Mon, 01 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-613 | |
| Metrics |
cvssV3_1
|
Mon, 01 Dec 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 01 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | nopCommerce v4.70 and prior, and version 4.80.3, does not invalidate session cookies after logout or session termination, allowing an attacker who has a a valid session cookie access to privileged endpoints (such as /admin) even after the legitimate user has logged out, enabling session hijacking. Any version above 4.70 that is not 4.80.3 fixes the vulnerability. | |
| Title | CVE-2025-11699 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2025-12-01T18:45:07.246Z
Reserved: 2025-10-13T16:24:26.286Z
Link: CVE-2025-11699
Updated: 2025-12-01T17:05:40.633Z
Status : Analyzed
Published: 2025-12-01T16:15:51.017
Modified: 2025-12-19T17:02:39.320
Link: CVE-2025-11699
No data.
OpenCVE Enrichment
Updated: 2025-12-01T21:27:30Z