php-censor v2.1.4 and fixed in v.2.1.5 was discovered to utilize a weak hashing algorithm for its remember_key value. This allows attackers to bruteforce to bruteforce the remember_key value to gain access to accounts that have checked "remember me" when logging in.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-1606 php-censor v2.1.4 and fixed in v.2.1.5 was discovered to utilize a weak hashing algorithm for its remember_key value. This allows attackers to bruteforce to bruteforce the remember_key value to gain access to accounts that have checked "remember me" when logging in.
Github GHSA Github GHSA GHSA-fqw7-839j-hvxj PHP Censor uses a weak hashing algorithm for the remember me key
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00048}

epss

{'score': 0.00062}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-02-13T15:53:31.694Z

Reserved: 2024-05-09T00:00:00.000Z

Link: CVE-2024-34914

cve-icon Vulnrichment

Updated: 2024-08-02T02:59:22.651Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-14T16:17:30.530

Modified: 2024-11-21T09:19:32.253

Link: CVE-2024-34914

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.