Description
Apostrophe CMS versions prior to 3.3.1 did not invalidate existing login sessions when disabling a user account or changing the password, creating a situation in which a device compromised by a third party could not be locked out by those means. As a mitigation for older releases the user account in question can be archived (3.x) or moved to the trash (2.x and earlier) which does disable the existing session.
No analysis available yet.
Remediation
Vendor Solution
Upgrade to version 3.4.0
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-2330 | Apostrophe CMS versions prior to 3.3.1 did not invalidate existing login sessions when disabling a user account or changing the password, creating a situation in which a device compromised by a third party could not be locked out by those means. As a mitigation for older releases the user account in question can be archived (3.x) or moved to the trash (2.x and earlier) which does disable the existing session. |
Github GHSA |
GHSA-9j9m-8wjc-ff96 | Apostrophe CMS Insufficient Session Expiration vulnerability |
References
History
Wed, 30 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Mend
Published:
Updated: 2025-04-30T15:52:36.538Z
Reserved: 2021-01-22T00:00:00.000Z
Link: CVE-2021-25979
Updated: 2024-08-03T20:19:19.646Z
Status : Modified
Published: 2021-11-08T15:15:07.743
Modified: 2024-11-21T05:55:43.347
Link: CVE-2021-25979
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA