CVE-2022-2820
High
|8.2Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to hijack a user's session by tricking them into using a session ID that the attacker controls. It can happen if the application does not properly change the session ID after a user logs in, making it easier for the attacker to gain unauthorized access to the user's account.
Technical Description
Session Fixation in GitHub repository namelessmc/nameless prior to v2.0.2.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactLow
Availability ImpactNone
ScopeUnchanged
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$3,526($1K-$5K)
Vendor Response
Grade FPatched in 1290 days
Quick Information
Published
Aug 15, 2022
over 3 years ago
Last Modified
Feb 25, 2026
about 1 month ago
Vendor
namelessmc
Product
nameless