A session fixation vulnerability exists in the zenml-io/zenml application, where JWT tokens used for user authentication are not invalidated upon logout. This flaw allows an attacker to bypass authentication mechanisms by reusing a victim's JWT token.
{
"github_reviewed_at": "2024-04-16T18:23:34Z",
"github_reviewed": true,
"severity": "MODERATE",
"nvd_published_at": "2024-04-16T00:15:11Z",
"cwe_ids": [
"CWE-384"
]
}