8.1

CVE-2021-25976

In PiranhaCMS, versions 4.0.0-alpha1 to 9.2.0 are vulnerable to cross-site request forgery (CSRF) when performing various actions supported by the management system, such as deleting a user, deleting a role, editing a post, deleting a media folder etc., when an ID is known.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
DotnetfoundationPiranha Cms Version >= 4.0.1 <= 9.2
DotnetfoundationPiranha Cms Version4.0.0 Update-
DotnetfoundationPiranha Cms Version4.0.0 Updatealpha1
DotnetfoundationPiranha Cms Version4.0.0 Updatealpha3
DotnetfoundationPiranha Cms Version4.0.0 Updatealpha4
DotnetfoundationPiranha Cms Version4.0.0 Updatealpha5
DotnetfoundationPiranha Cms Version4.0.0 Updatealpha6
DotnetfoundationPiranha Cms Version4.0.0 Updatealpha7
DotnetfoundationPiranha Cms Version4.0.0 Updatealpha8
DotnetfoundationPiranha Cms Version4.0.0 Updatealpha9
DotnetfoundationPiranha Cms Version4.0.0 Updatebeta1
DotnetfoundationPiranha Cms Version4.0.0 Updaterc1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.1% 0.285
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.1 2.8 5.2
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
nvd@nist.gov 4 4.9 4.9
AV:N/AC:H/Au:N/C:N/I:P/A:P
vulnerabilitylab@mend.io 8.1 2.8 5.2
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
CWE-352 Cross-Site Request Forgery (CSRF)

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.