php-censor v2.1.4 and fixed in v.2.1.5 was discovered to utilize a weak hashing algorithm for its remember_key value. This allows attackers to bruteforce to bruteforce the remember_key value to gain access to accounts that have checked "remember me" when logging in.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1606 | php-censor v2.1.4 and fixed in v.2.1.5 was discovered to utilize a weak hashing algorithm for its remember_key value. This allows attackers to bruteforce to bruteforce the remember_key value to gain access to accounts that have checked "remember me" when logging in. |
Github GHSA |
GHSA-fqw7-839j-hvxj | PHP Censor uses a weak hashing algorithm for the remember me key |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://chmod744.super.site/redacted-vulnerability |
|
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T15:53:31.694Z
Reserved: 2024-05-09T00:00:00.000Z
Link: CVE-2024-34914
Updated: 2024-08-02T02:59:22.651Z
Status : Awaiting Analysis
Published: 2024-05-14T16:17:30.530
Modified: 2024-11-21T09:19:32.253
Link: CVE-2024-34914
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA