CVE-2022-46170

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-46170
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-46170.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-46170
Aliases
Published
2022-12-22T18:58:17Z
Modified
2025-10-22T18:34:44.440026Z
Severity
  • 8.6 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L CVSS Calculator
Summary
CodeIgniter is vulnerable to improper authentication via Session Handlers
Details

CodeIgniter is a PHP full-stack web framework. When an application uses (1) multiple session cookies (e.g., one for user pages and one for admin pages) and (2) a session handler is set to DatabaseHandler, MemcachedHandler, or RedisHandler, then if an attacker gets one session cookie (e.g., one for user pages), they may be able to access pages that require another session cookie (e.g., for admin pages). This issue has been patched, please upgrade to version 4.2.11 or later. As a workaround, use only one session cookie.

Database specific
{
    "cwe_ids": [
        "CWE-287"
    ]
}
References

Affected packages

Git / github.com/codeigniter4/codeigniter4

Affected ranges

Type
GIT
Repo
https://github.com/codeigniter4/codeigniter4
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

4.*

4.0.0
4.0.2

v4.*

v4.0.0-alpha.1
v4.0.0-alpha.2
v4.0.0-alpha.3
v4.0.0-alpha.4
v4.0.0-alpha.5
v4.0.0-beta.1
v4.0.0-beta.3
v4.0.0-beta.4
v4.0.0-rc.1
v4.0.0-rc.2
v4.0.0-rc.2.1
v4.0.0-rc.2b
v4.0.0-rc.3
v4.0.0-rc.4
v4.0.0.0-alpha.5
v4.0.1
v4.0.3
v4.0.4
v4.0.5
v4.1.0
v4.1.1
v4.1.2
v4.1.3
v4.1.4
v4.1.5
v4.1.6
v4.1.7
v4.1.8
v4.1.9
v4.2.0
v4.2.1
v4.2.10
v4.2.2
v4.2.3
v4.2.4
v4.2.5
v4.2.6
v4.2.7
v4.2.8
v4.2.9