Description
An issue that could prevent session inactivity timeouts from triggering due to automatic page reloading has been resolved. This is an instance of CWE-613: Insufficient Control of Resources After Expiration or Release, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N (5.9 Medium). This issue was fixed in version 4.0.260203.0 of the runZero Platform.
Published: 2026-04-07
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Session Persistence and Unauthorized Access
Action: Apply Patch
AI Analysis

Impact

An issue in runZero Platform prevents inactivity timeouts from functioning when the page automatically reloads, creating a situation where authenticated sessions can remain active indefinitely. This flaw, documented as CWE‑613, means a user who has logged in can continue to operate as if they were still within a session that should have expired, allowing potential unauthorized actions during what should be a protected downtime. The vulnerability has a CVSS 3.1 score of 5.9, classifying it as medium severity. The specified impact involves loss of confidentiality and integrity of data accessed through the continued session, and a denial of the intended isolation of idle users.

Affected Systems

All runZero Platform installations running any version older than 4.0.260203.0 are susceptible. The vendor has released a fix in version 4.0.260203.0 that addresses the automatic reload logic preventing timeout enforcement.

Risk and Exploitability

The CVSS score of 5.9 indicates moderate risk, and because no EPSS score is available and the vulnerability is not listed in the CISA KEV catalog, there is no evidence of widespread exploitation. The most likely attack scenario involves an attacker who already holds an authenticated session or can force a page reload to keep the session alive; a public exploit is not documented. Administrators should consider the risk as significant for systems that allow prolonged idle sessions, particularly in environments where user actions could be critical or sensitive. Prompt remediation reduces the window for any potential misuse.

Generated by OpenCVE AI on April 7, 2026 at 20:35 UTC.

Remediation

Vendor Solution

This issue was fixed in version 4.0.260203.0 of the runZero Platform


OpenCVE Recommended Actions

  • Update the runZero Platform to version 4.0.260203.0 or later.

Generated by OpenCVE AI on April 7, 2026 at 20:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 21 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Runzero runzero Platform
CPEs cpe:2.3:a:runzero:runzero_platform:*:*:*:*:*:*:*:*
Vendors & Products Runzero runzero Platform

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Runzero
Runzero platform
Vendors & Products Runzero
Runzero platform

Tue, 07 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description An issue that could prevent session inactivity timeouts from triggering due to automatic page reloading has been resolved. This is an instance of CWE-613: Insufficient Control of Resources After Expiration or Release, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N (5.9 Medium). This issue was fixed in version 4.0.260203.0 of the runZero Platform.
Title runZero Platform session timeout failure
Weaknesses CWE-613
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Runzero Platform Runzero Platform
cve-icon MITRE

Status: PUBLISHED

Assigner: runZero

Published:

Updated: 2026-04-07T20:00:20.760Z

Reserved: 2026-04-01T19:56:00.292Z

Link: CVE-2026-5376

cve-icon Vulnrichment

Updated: 2026-04-07T19:53:23.195Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T15:17:47.610

Modified: 2026-04-21T15:22:27.360

Link: CVE-2026-5376

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:49:17Z

Weaknesses