Description

blueprintUE is a tool to help Unreal Engine developers. Prior to 4.2.0, when a user changes their password via the profile edit page, or when a password reset is completed via the reset link, neither operation invalidates existing authenticated sessions for that user. A server-side session store associates userID → session; the current password change/reset flow updates only the password column in the users table and does not destroy or mark invalid any active sessions. As a result, an attacker who has already compromised a session retains full access to the account indefinitely — even after the legitimate user has detected the intrusion and changed their password — until the session's natural expiry time (configured as SESSION_GC_MAXLIFETIME, defaulting to 86400 seconds / 24 hours, with SESSION_LIFETIME=0 meaning persistent until browser close or GC, whichever is later). This vulnerability is fixed in 4.2.0.

INFO

Published Date :

2026-04-21T17:11:23.740Z

Last Modified :

2026-04-21T20:37:05.304Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-40587 vulnerability.

Vendors Products
Blueprintue
  • Blueprintue-self-hosted-edition
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-40587.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact