### [CVE-2024-25977](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25977) ![](https://img.shields.io/static/v1?label=Product&message=HAWKI&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-384%20Session%20Fixation&color=brighgreen) ### Description The application does not change the session token when using the login or logout functionality. An attacker can set a session token in the victim's browser (e.g. via XSS) and prompt the victim to log in (e.g. via a redirect to the login page). This results in the victim's account being taken over. ### POC #### Reference - https://r.sec-consult.com/hawki #### Github No PoCs found on GitHub currently.