Apostrophe CMS versions prior to 3.3.1 did not invalidate existing login sessions when disabling a user account or changing the password, creating a situation in which a device compromised by a third party could not be locked out by those means. As a mitigation for older releases the user account in question can be archived (3.x) or moved to the trash (2.x and earlier) which does disable the existing session.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-2330 Apostrophe CMS versions prior to 3.3.1 did not invalidate existing login sessions when disabling a user account or changing the password, creating a situation in which a device compromised by a third party could not be locked out by those means. As a mitigation for older releases the user account in question can be archived (3.x) or moved to the trash (2.x and earlier) which does disable the existing session.
Github GHSA Github GHSA GHSA-9j9m-8wjc-ff96 Apostrophe CMS Insufficient Session Expiration vulnerability
Fixes

Solution

Upgrade to version 3.4.0


Workaround

No workaround given by the vendor.

History

Wed, 30 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Mend

Published:

Updated: 2025-04-30T15:52:36.538Z

Reserved: 2021-01-22T00:00:00.000Z

Link: CVE-2021-25979

cve-icon Vulnrichment

Updated: 2024-08-03T20:19:19.646Z

cve-icon NVD

Status : Modified

Published: 2021-11-08T15:15:07.743

Modified: 2024-11-21T05:55:43.347

Link: CVE-2021-25979

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.