Description
In PiranhaCMS, versions 4.0.0-alpha1 to 9.2.0 are vulnerable to cross-site request forgery (CSRF) when performing various actions supported by the management system, such as deleting a user, deleting a role, editing a post, deleting a media folder etc., when an ID is known.
References (2)
Core 2
Core References
Patch, Third Party Advisory x_refsource_misc
https://github.com/PiranhaCMS/piranha.core/commit/e42abacdd0dd880ce9cf6607efcc24646ac82eda
Third Party Advisory x_refsource_misc
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25976
Scores
CVSS v3
8.1
EPSS
0.0010
EPSS Percentile
27.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-352
Status
published
Products (3)
dotnetfoundation/piranha_cms
4.0.0 (11 CPE variants)
dotnetfoundation/piranha_cms
4.0.1 - 9.2
nuget/Piranha
4.0.0-alpha1 - 10.0-alpha1NuGet
Published
Nov 16, 2021
Tracked Since
Feb 18, 2026