OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application does not invalidate existing sessions when a user is disabled or when a password change occurs, allowing active session cookies to remain valid indefinitely. As a result, a disabled user, or an attacker using a compromised account, can continue to access protected pages and perform operations as long as a prior session remains active. Because the server performs no session revocation or session-store cleanup during these critical state changes, disabling an account or updating credentials has no effect on already-established sessions. This makes administrative disable actions ineffective and allows unauthorized users to retain full access even after an account is closed or a password is reset, exposing the system to prolonged unauthorized use and significantly increasing the impact of account takeover scenarios. This issue has been patched in version 5.8.
References
| Link | Resource |
|---|---|
| https://github.com/orangehrm/orangehrm/security/advisories/GHSA-99qp-xh4q-pr9x | Vendor Advisory |
Configurations
History
03 Dec 2025, 16:47
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Orangehrm orangehrm
Orangehrm |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| References | () https://github.com/orangehrm/orangehrm/security/advisories/GHSA-99qp-xh4q-pr9x - Vendor Advisory | |
| CPE | cpe:2.3:a:orangehrm:orangehrm:*:*:*:*:*:*:*:* |
29 Nov 2025, 04:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-29 04:15
Updated : 2025-12-03 16:47
NVD link : CVE-2025-66289
Mitre link : CVE-2025-66289
CVE.ORG link : CVE-2025-66289
JSON object : View
Products Affected
orangehrm
- orangehrm
CWE
CWE-613
Insufficient Session Expiration
