GHSA-VW84-HPRM-CXMM
Vulnerability from github – Published: 2025-10-31 21:24 – Updated: 2025-10-31 21:24
VLAI?
Summary
Agno session state overwrites between different sessions/users
Details
Impact
Under certain conditions (under high concurrency), when session_state is passed to an Agent or Team during run or arun calls, a race condition can occur, causing a session_state to be assigned and persisted to the incorrect session. This may result in user data from one session being exposed to another user.
Patches
This has been patched in version 2.2.2. Upgrade with pip install -U agno.
Severity ?
7.1 (High)
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "agno"
},
"ranges": [
{
"events": [
{
"introduced": "2.0.0"
},
{
"fixed": "2.2.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-64168"
],
"database_specific": {
"cwe_ids": [
"CWE-362",
"CWE-668"
],
"github_reviewed": true,
"github_reviewed_at": "2025-10-31T21:24:53Z",
"nvd_published_at": "2025-10-31T15:15:43Z",
"severity": "HIGH"
},
"details": "### Impact\nUnder certain conditions (under high concurrency), when `session_state` is passed to an Agent or Team during run or arun calls, a race condition can occur, causing a `session_state` to be assigned and persisted to the incorrect session. This may result in user data from one session being exposed to another user.\n\n### Patches\nThis has been patched in version 2.2.2. Upgrade with `pip install -U agno`.",
"id": "GHSA-vw84-hprm-cxmm",
"modified": "2025-10-31T21:24:53Z",
"published": "2025-10-31T21:24:53Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/agno-agi/agno/security/advisories/GHSA-vw84-hprm-cxmm"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64168"
},
{
"type": "PACKAGE",
"url": "https://github.com/agno-agi/agno"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N",
"type": "CVSS_V3"
}
],
"summary": "Agno session state overwrites between different sessions/users"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…