If a persistent cookie in a leaked [cookie] file contains an authenticator, an adversary can simply copy the … a public system (e.g., a library's computer] and receives a persistent authentication cookie … , any subsequent user … can access the account. … Do not store authenticators in persistent cookies.
Google-1
Google-2
Copyright clearance needed for quotation.