Description
Apostrophe CMS versions prior to 3.3.1 did not invalidate existing login sessions when disabling a user account or changing the password, creating a situation in which a device compromised by a third party could not be locked out by those means. As a mitigation for older releases the user account in question can be archived (3.x) or moved to the trash (2.x and earlier) which does disable the existing session.
Published: 2021-11-08
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Upgrade to version 3.4.0

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-2330 Apostrophe CMS versions prior to 3.3.1 did not invalidate existing login sessions when disabling a user account or changing the password, creating a situation in which a device compromised by a third party could not be locked out by those means. As a mitigation for older releases the user account in question can be archived (3.x) or moved to the trash (2.x and earlier) which does disable the existing session.
Github GHSA Github GHSA GHSA-9j9m-8wjc-ff96 Apostrophe CMS Insufficient Session Expiration vulnerability
History

Wed, 30 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Apostrophecms Apostrophecms
cve-icon MITRE

Status: PUBLISHED

Assigner: Mend

Published:

Updated: 2025-04-30T15:52:36.538Z

Reserved: 2021-01-22T00:00:00.000Z

Link: CVE-2021-25979

cve-icon Vulnrichment

Updated: 2024-08-03T20:19:19.646Z

cve-icon NVD

Status : Modified

Published: 2021-11-08T15:15:07.743

Modified: 2024-11-21T05:55:43.347

Link: CVE-2021-25979

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses