|  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Sec Bug #81722 Session Fixation in PHP Core PHPSESSID
Submitted: 2022-06-14 19:17 UTC Modified: 2022-06-20 12:47 UTC
From: aslantugay at hotmail dot com Assigned:
Status: Not a bug Package: Unknown/Other Function
PHP Version: 7.4.30 OS: Ubuntu
Private report: No CVE-ID: None
View Add Comment Developer Edit
Welcome! If you don't have a Git account, you can't do anything here.
You can add a comment by following this link or if you reported this bug, you can edit this bug over here.
Block user comment
Status: Assign to:
Bug Type:
From: aslantugay at hotmail dot com
New email:
PHP Version: OS:


 [2022-06-14 19:17 UTC] aslantugay at hotmail dot com
with this vulnerability you can change target session id via changing in browser or MITM attack. When you send custom PHPSESSID php accept that and you have two session ID for same account. This vulnerability classifed as session fixation.

Test script:

Expected result:
Some platforms make it easy to protect against Session Fixation, while others make it a lot more difficult. In most cases, simply discarding any existing session is sufficient to force the framework to issue a new sessionid cookie, with a new value.


Add a Patch

Pull Requests

Add a Pull Request


AllCommentsChangesGit/SVN commitsRelated reports
 [2022-06-15 06:38 UTC]
-Status: Open +Status: Not a bug
 [2022-06-15 06:38 UTC]
Thank you for taking the time to write to us, but this is not
a bug. Please double-check the documentation available at and the instructions on how to report
a bug at

Use session.use_strict_mode

PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Tue May 28 02:01:31 2024 UTC