Session cookies can be replayed after user logout
Published: May 07, 2026
SECURITY IDENTIFIERS
- CVE: CVE-2026-44511 (NVD)
- GHSA: GHSA-4cx3-3c38-j9vv
- Vendor Advisory: https://github.com/katalyst/koi/security/advisories/GHSA-4cx3-3c38-j9vv
GEM
SEVERITY
CVSS v3.x: 7.4 (High)
PATCHED VERSIONS
~> 4.20.0
>= 5.6.0
DESCRIPTION
Impact
Admin session cookies were not invalidated when an admin user logged out. An attacker with access to a valid admin session cookie could continue to access admin functionality after logout, until the cookie expired or session secrets were rotated.
This affects applications using Koi admin authentication where an admin session cookie may have been exposed, cached, intercepted, or otherwise retained after logout.
Patches
The issue has been patched by recording admin logout time and rejecting any admin session cookie created before the user’s most recent logout.
Users should upgrade to the patched Koi releases once available.
Workarounds
Katalyst Koi recommends upgrading to the latest available version, or back porting the changes released in 5.6.0/4.20.0
Resources
This is an application of https://guides.rubyonrails.org/v5.2.0/security.html#replay-attacks-for-cookiestore-sessions .
RELATED
- https://nvd.nist.gov/vuln/detail/CVE-2026-44511
- https://github.com/katalyst/koi/commit/606b33c140a61b1a2b37878ca7504741ec68df33
- https://github.com/katalyst/koi/commit/fdbfb404a9500f7fed33e03ab2eb7c2578f9652c
- https://github.com/katalyst/koi/security/advisories/GHSA-4cx3-3c38-j9vv
- https://guides.rubyonrails.org/v5.2.0/security.html#replay-attacks-for-cookiestore-sessions
- https://github.com/advisories/GHSA-4cx3-3c38-j9vv
