Vulnerability Description
In PiranhaCMS, versions 4.0.0-alpha1 to 9.2.0 are vulnerable to cross-site request forgery (CSRF) when performing various actions supported by the management system, such as deleting a user, deleting a role, editing a post, deleting a media folder etc., when an ID is known.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dotnetfoundation | Piranha Cms | >= 4.0.1, <= 9.2 |
Related Weaknesses (CWE)
References
- https://github.com/PiranhaCMS/piranha.core/commit/e42abacdd0dd880ce9cf6607efcc24PatchThird Party Advisory
- https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25976Third Party Advisory
- https://github.com/PiranhaCMS/piranha.core/commit/e42abacdd0dd880ce9cf6607efcc24PatchThird Party Advisory
- https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25976Third Party Advisory
FAQ
What is CVE-2021-25976?
CVE-2021-25976 is a vulnerability with a CVSS score of 8.1 (HIGH). In PiranhaCMS, versions 4.0.0-alpha1 to 9.2.0 are vulnerable to cross-site request forgery (CSRF) when performing various actions supported by the management system, such as deleting a user, deleting ...
How severe is CVE-2021-25976?
CVE-2021-25976 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-25976?
Check the references section above for vendor advisories and patch information. Affected products include: Dotnetfoundation Piranha Cms.