CVE-2021-25966

Source
https://cve.org/CVERecord?id=CVE-2021-25966
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-25966.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-25966
Published
2021-10-10T10:15:07.270Z
Modified
2025-11-20T11:37:16.452018Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In “Orchard core CMS” application, versions 1.0.0-beta1-3383 to 1.0.0 are vulnerable to an improper session termination after password change. When a password has been changed by the user or by an administrator, a user that was already logged in, will still have access to the application even after the password was changed.

References

Affected packages

Git / github.com/orchardcms/orchardcore

Affected ranges

Type
GIT
Repo
https://github.com/orchardcms/orchardcore
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*
1.0.0-alpha
1.0.0-beta1
1.0.0-beta2
1.0.0-beta3
1.0.0-rc1
1.0.0-rc2
Other
beta3-70777
beta3-70866
beta3-70919
beta3-70935
beta3-70939
beta3-71077
beta3-71370
beta3-71420
beta3-71610
beta3-71674
beta3-71772
beta3-71808
beta3-71865
beta3-71912
beta3-72310
beta3-72421
rc1-10054
rc1-10064
rc1-10075
rc1-10106
rc1-11259
rc1-11419
rc1-11774
rc1-11907
rc1-12128
rc1-12806
rc1-12811
rc2-13929
v0.*
v0.0.1
v0.0.2
v0.0.3
v0.0.4
v1.*
v1.0.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-25966.json"