PILOS (Platform for Interactive Live-Online Seminars) is a frontend for BigBlueButton. Prior to 4.8.0, users with a local account can change their password while logged in. When doing so, all other active sessions are terminated, except for the currently active one. However, the current session’s token remains valid and is not refreshed. If an attacker has previously obtained this session token through another vulnerability, changing the password will not invalidate their access. As a result, the attacker can continue to act as the user even after the password has been changed. This vulnerability is fixed in 4.8.0.
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 28 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Tue, 28 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Thm Thm pilos | |
| Vendors & Products | Thm Thm pilos | 
Mon, 27 Oct 2025 21:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | PILOS (Platform for Interactive Live-Online Seminars) is a frontend for BigBlueButton. Prior to 4.8.0, users with a local account can change their password while logged in. When doing so, all other active sessions are terminated, except for the currently active one. However, the current session’s token remains valid and is not refreshed. If an attacker has previously obtained this session token through another vulnerability, changing the password will not invalidate their access. As a result, the attacker can continue to act as the user even after the password has been changed. This vulnerability is fixed in 4.8.0. | |
| Title | PILOS is missing session regeneration after password change | |
| Weaknesses | CWE-613 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-10-27T21:22:06.997Z
Updated: 2025-10-28T15:08:38.476Z
Reserved: 2025-10-22T18:55:48.007Z
Link: CVE-2025-62781
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-10-28T15:08:24.488Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-10-27T22:15:42.153
Modified: 2025-10-30T15:05:32.197
Link: CVE-2025-62781
 Redhat
                        Redhat
                    No data.