CVE-2021-25976

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-25976
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-25976.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-25976
Aliases
Published
2021-11-16T09:15:06Z
Modified
2024-10-12T07:07:18.913937Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H CVSS Calculator
Summary
[none]
Details

In PiranhaCMS, versions 4.0.0-alpha1 to 9.2.0 are vulnerable to cross-site request forgery (CSRF) when performing various actions supported by the management system, such as deleting a user, deleting a role, editing a post, deleting a media folder etc., when an ID is known.

References

Affected packages

Git / github.com/piranhacms/piranha.core

Affected ranges

Type
GIT
Repo
https://github.com/piranhacms/piranha.core
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v.*

v.6.1.1

v4.*

v4.0.0
v4.0.0-alpha1
v4.0.0-alpha3
v4.0.0-alpha4
v4.0.0-alpha5
v4.0.0-alpha6
v4.0.0-alpha7
v4.0.0-alpha8
v4.0.0-alpha9
v4.0.0-beta1
v4.0.0-rc1
v4.0.1
v4.1.0
v4.1.0-alpha1
v4.1.0-beta1
v4.1.0-beta2
v4.1.1
v4.2.0
v4.2.0-alpha1
v4.2.0-alpha2
v4.2.0-beta1
v4.2.1
v4.3.0
v4.3.0-beta1
v4.3.1

v5.*

v5.0.0
v5.0.0-alpha1
v5.0.0-beta1
v5.0.1
v5.1.0
v5.1.0-alpha1
v5.1.0-beta1
v5.1.1
v5.1.2
v5.2.0
v5.2.0-beta1
v5.2.0-beta2
v5.2.1
v5.3.0
v5.3.0-beta1
v5.3.1
v5.4.0

v6.*

v6.0.0
v6.0.1
v6.0.2
v6.1.0

v7.*

v7.0-sr2
v7.0-sr3
v7.0-sr4
v7.0-sr5
v7.0.0
v7.0.0-alpha1
v7.0.0-alpha2
v7.0.0-beta1
v7.0.1
v7.1.0

v8.*

v8.0
v8.0-sr1
v8.0-sr2
v8.1
v8.1-sr1
v8.2
v8.3
v8.3-sr1
v8.3-sr2
v8.4
v8.4-sr1
v8.4-sr2
v8.4-sr3

v9.*

v9.0
v9.0-beta1
v9.0-rc1
v9.0-rc2
v9.0-sr1
v9.1
v9.1-alpha1
v9.1-alpha2
v9.1-beta1
v9.1-sr1
v9.2