Insufficient Session Expiration in answerdev/answer
Description
Insufficient Session Expiration in GitHub repository answerdev/answer prior to 1.0.6.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2023-1543: Insufficient session expiration in Answer prior to 1.0.6 allows unauthorized access through stale admin session data.
Vulnerability
Overview
The vulnerability is an insufficient session expiration issue in the Answer Q&A platform (prior to version 1.0.6). The root cause is that the logout functionality fails to clear the admin user's session cache from the system's internal storage. Specifically, the UserLogout method in the user controller was missing a call to remove the admin-specific cache entry (RemoveAdminUserCacheInfo), causing the stale session data to remain valid after logout [1][3].
Attack
Vector
To exploit this, an attacker would need to either gain access to a shared system where an administrative user had previously logged in, or obtain a leaked session token. Since the admin cache is not cleared upon logout, an attacker could reuse the old session token to maintain authenticated access as the admin, bypassing the intended logout mechanism. No additional authentication or network privileges are required beyond possessing the stale token [3][4].
Impact
Successful exploitation allows an attacker with a stale admin session token to perform actions with full administrative privileges, including accessing sensitive data, modifying system configurations, or performing other high-privilege operations on the Q&A platform. This completely undermines the session security model, as logout does not effectively revoke the session [1][4].
Mitigation
The issue was fixed in commit cd742b75605c99776f32d271c0a60e0f468e181c, which adds the missing RemoveAdminUserCacheInfo call to the logout path. Users are advised to upgrade to Answer version 1.0.6 or later to ensure that admin sessions are properly invalidated upon logout [3][4].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/answerdev/answerGo | < 1.0.6 | 1.0.6 |
Affected products
2- answerdev/answerdev/answerv5Range: unspecified
Patches
1cd742b75605cfix(user): Remove admin cache when user logout.
1 file changed · +1 −0
internal/controller/user_controller.go+1 −0 modified@@ -203,6 +203,7 @@ func (uc *UserController) UserLogout(ctx *gin.Context) { return } _ = uc.authService.RemoveUserCacheInfo(ctx, accessToken) + _ = uc.authService.RemoveAdminUserCacheInfo(ctx, accessToken) handler.HandleResponse(ctx, nil, nil) }
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.