In PiranhaCMS, versions 4.0.0-alpha1 to 9.2.0 are vulnerable to cross-site request forgery (CSRF) when performing various actions supported by the management system, such as deleting a user, deleting a role, editing a post, deleting a media folder etc., when an ID is known.
References
Link | Resource |
---|---|
https://github.com/PiranhaCMS/piranha.core/commit/e42abacdd0dd880ce9cf6607efcc24646ac82eda | Patch Third Party Advisory |
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25976 | Third Party Advisory |
https://github.com/PiranhaCMS/piranha.core/commit/e42abacdd0dd880ce9cf6607efcc24646ac82eda | Patch Third Party Advisory |
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25976 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/PiranhaCMS/piranha.core/commit/e42abacdd0dd880ce9cf6607efcc24646ac82eda - Patch, Third Party Advisory | |
References | () https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25976 - Third Party Advisory |
Information
Published : 2021-11-16 09:15
Updated : 2024-11-21 05:55
NVD link : CVE-2021-25976
Mitre link : CVE-2021-25976
CVE.ORG link : CVE-2021-25976
JSON object : View
Products Affected
dotnetfoundation
- piranha_cms
CWE
CWE-352
Cross-Site Request Forgery (CSRF)