mirror of
https://github.com/fosrl/pangolin.git
synced 2026-05-21 01:11:38 -05:00
[GH-ISSUE #1887] Urgent: User Session Length Not Enforced in Server Admin/New Organization Section or or Security-Sensitive Account Settings. #2036
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @keonramses on GitHub (Nov 18, 2025).
Original GitHub issue: https://github.com/fosrl/pangolin/issues/1887
Describe the Bug
Pangolin recently introduced a feature to enforce user session length, requiring users to re-authenticate after a configured duration.
While session enforcement works correctly for the main organization instance (user-facing UI), several critical areas continue to remain accessible even after the session has expired:
This results in an incomplete session timeout that leaves highly sensitive sections available without requiring re-authentication.
https://github.com/user-attachments/assets/d7836c45-a79e-4f98-b019-c99c67e3d48a
Environment
OS Type & Version: Rocky Linux 10
Pangolin Version: ee-1.12.2
Gerbil Version: 1.2.2
Traefik Version: 3.5.3
Newt Version: 1.6.0
Olm Version: N/A
To Reproduce
Expected Behaviour
Once the configured session duration expires:
Actual Results
These pages continue working indefinitely, ignoring the session timeout.
@miloschwartz commented on GitHub (Nov 19, 2025):
Thanks for reporting this. Although, FYI, please follow
SECURITY.mdin the future.While this is a little confusing, this is intended behavior. It's a classic multi-tenant problem. How do you enforce account security on a user that exists in more than tenant?
Security controls are enforced per organization which is important because a user could exist in more than one organization with completely different security controls of different strictness. Therefore, they don't apply to higher level constructs like the user's profile (key, password change, etc), and the server admin panel. You can think of these existing security controls as securing an organization and all it's contents (resources).
Also, the server admin section is only available to the root user of the account. This is assumed to be controlled by the server owner with a good security posture and not end users, thus the security controls are not enforced.
To do what you're requesting would require a new feature to enforce these at the server level rather than the tenant level.
@keonramses commented on GitHub (Nov 19, 2025):
Thank you for the explanation, and my apologies, I had a brain fart moment and did not look at the security.md