First published: Mon Nov 08 2021(Updated: )
Apostrophe CMS versions prior to 3.3.1 did not invalidate existing login sessions when disabling a user account or changing the password, creating a situation in which a device compromised by a third party could not be locked out by those means. As a mitigation for older releases the user account in question can be archived (3.x) or moved to the trash (2.x and earlier) which does disable the existing session.
Credit: vulnerabilitylab@mend.io
Affected Software | Affected Version | How to fix |
---|---|---|
Apostrophecms Apostrophecms | >=2.63.0<3.3.1 |
Upgrade to version 3.4.0
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-25979 is a vulnerability in Apostrophe CMS versions prior to 3.3.1.
CVE-2021-25979 has a severity value of 9.8 which is considered critical.
CVE-2021-25979 allows a compromised device to not be locked out when a user account is disabled or password is changed in Apostrophe CMS versions prior to 3.3.1.
To mitigate CVE-2021-25979, it is recommended to update Apostrophe CMS to version 3.3.1 or later.
Yes, you can find more information about CVE-2021-25979 at the following link: [GitHub Commit](https://github.com/apostrophecms/apostrophe/commit/c211b211f9f4303a77a307cf41aac9b4ef8d2c7c).