CVE-2021-25979
CRITICALApostrophecms < 3.3.1 - Insufficient Session Expiration
Title source: ruleDescription
Apostrophe CMS versions prior to 3.3.1 did not invalidate existing login sessions when disabling a user account or changing the password, creating a situation in which a device compromised by a third party could not be locked out by those means. As a mitigation for older releases the user account in question can be archived (3.x) or moved to the trash (2.x and earlier) which does disable the existing session.
References (1)
Core 1
Core References
Patch, Third Party Advisory x_refsource_misc
https://github.com/apostrophecms/apostrophe/commit/c211b211f9f4303a77a307cf41aac9b4ef8d2c7c
Scores
CVSS v3
9.8
EPSS
0.0036
EPSS Percentile
58.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-613
Status
published
Products (2)
apostrophecms/apostrophecms
2.63.0 - 3.3.1
npm/apostrophe
2.63.0 - 3.4.0npm
Published
Nov 08, 2021
Tracked Since
Feb 18, 2026