RubySec

Providing security resources for the Ruby community

CVE-2026-44511 (katalyst-koi): Session cookies can be replayed after user logout

Session cookies can be replayed after user logout

Published: May 07, 2026

SECURITY IDENTIFIERS

GEM

katalyst-koi

SEVERITY

CVSS v3.x: 7.4 (High)

PATCHED VERSIONS

~> 4.20.0 >= 5.6.0

DESCRIPTION

Impact

Admin session cookies were not invalidated when an admin user logged out. An attacker with access to a valid admin session cookie could continue to access admin functionality after logout, until the cookie expired or session secrets were rotated.

This affects applications using Koi admin authentication where an admin session cookie may have been exposed, cached, intercepted, or otherwise retained after logout.

Patches

The issue has been patched by recording admin logout time and rejecting any admin session cookie created before the user’s most recent logout.

Users should upgrade to the patched Koi releases once available.

Workarounds

Katalyst Koi recommends upgrading to the latest available version, or back porting the changes released in 5.6.0/4.20.0

Resources

This is an application of https://guides.rubyonrails.org/v5.2.0/security.html#replay-attacks-for-cookiestore-sessions .

RELATED