7.4
CVSSv3

CVE-2021-29487

Published: 26/08/2021 Updated: 02/08/2022
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.4 | Impact Score: 5.2 | Exploitability Score: 2.2
VMScore: 516
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

octobercms in a CMS platform based on the Laravel PHP Framework. In affected versions of the october/system package an attacker can exploit this vulnerability to bypass authentication and takeover of and user account on an October CMS server. The vulnerability is exploitable by unauthenticated users via a specially crafted request. This only affects frontend users and the attacker must obtain a Laravel secret key for cookie encryption and signing in order to exploit this vulnerability. The issue has been patched in Build 472 and v1.1.5.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

octobercms october

Github Repositories

Patch your code for October CMS Auth Bypass CVE-2021-32648

CVE-2021-32648 Patch your code for October CMS Auth Bypass CVE-2021-32648 Instructions Open the file vendor/october/rain/src/Auth/Models/Userphp Perform the patch found in these diff notes Save the file Overview You are converting a loose comparison to a strict comparison by replacing two (2) equal signs == with three (3) equal signs === This blocks the attack vector as des