In ArangoDB, versions v3.7.6 through v3.8.3 are vulnerable to Insufficient Session Expiration. When a user’s password is changed by the administrator, the session isn’t invalidated, allowing a malicious user to still be logged in and perform arbitrary actions within the system.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-12797 | In ArangoDB, versions v3.7.6 through v3.8.3 are vulnerable to Insufficient Session Expiration. When a user’s password is changed by the administrator, the session isn’t invalidated, allowing a malicious user to still be logged in and perform arbitrary actions within the system. |
Fixes
Solution
Update to v3.9.0-alpha.1 or later
Workaround
No workaround given by the vendor.
References
History
Wed, 30 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Mend
Published:
Updated: 2025-04-30T15:45:47.172Z
Reserved: 2021-01-22T00:00:00.000Z
Link: CVE-2021-25940
Updated: 2024-08-03T20:19:18.989Z
Status : Modified
Published: 2021-11-16T10:15:06.783
Modified: 2024-11-21T05:55:38.640
Link: CVE-2021-25940
No data.
OpenCVE Enrichment
No data.
EUVD