GHSA-VW84-HPRM-CXMM

Vulnerability from github – Published: 2025-10-31 21:24 – Updated: 2025-10-31 21:24
VLAI?
Summary
Agno session state overwrites between different sessions/users
Details

Impact

Under certain conditions (under high concurrency), when session_state is passed to an Agent or Team during run or arun calls, a race condition can occur, causing a session_state to be assigned and persisted to the incorrect session. This may result in user data from one session being exposed to another user.

Patches

This has been patched in version 2.2.2. Upgrade with pip install -U agno.

Show details on source website

{
  "affected": [
    {
      "package": {
        "ecosystem": "PyPI",
        "name": "agno"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "2.0.0"
            },
            {
              "fixed": "2.2.2"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2025-64168"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-362",
      "CWE-668"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2025-10-31T21:24:53Z",
    "nvd_published_at": "2025-10-31T15:15:43Z",
    "severity": "HIGH"
  },
  "details": "### Impact\nUnder certain conditions (under high concurrency), when `session_state` is passed to an Agent or Team during run or arun calls, a race condition can occur, causing a `session_state` to be assigned and persisted to the incorrect session. This may result in user data from one session being exposed to another user.\n\n### Patches\nThis has been patched in version 2.2.2. Upgrade with `pip install -U agno`.",
  "id": "GHSA-vw84-hprm-cxmm",
  "modified": "2025-10-31T21:24:53Z",
  "published": "2025-10-31T21:24:53Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/agno-agi/agno/security/advisories/GHSA-vw84-hprm-cxmm"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64168"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/agno-agi/agno"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N",
      "type": "CVSS_V3"
    }
  ],
  "summary": "Agno session state overwrites between different sessions/users"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…