Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pq7v-9vmm-7jw6

Опубликовано: 27 фев. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 4.8
CVSS3: 9.8

Описание

PluXml CMS allows a user's session identifier to be set before authentication. The value of this session ID stays the same after authentication. This behaviour enables an attacker to fix a session ID for a victim and later hijack the authenticated session.

The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only versions 5.8.21 and 5.9.0-rc7 were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

PluXml CMS allows a user's session identifier to be set before authentication. The value of this session ID stays the same after authentication. This behaviour enables an attacker to fix a session ID for a victim and later hijack the authenticated session.

The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only versions 5.8.21 and 5.9.0-rc7 were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

EPSS

Процентиль: 18%
0.00059
Низкий

4.8 Medium

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-384

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 1 месяца назад

PluXml CMS allows a user's session identifier to be set before authentication. The value of this session ID stays the same after authentication. This behaviour enables an attacker to fix a session ID for a victim and later hijack the authenticated session. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only versions 5.8.21 and 5.9.0-rc7 were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

CVSS3: 9.8
nvd
около 1 месяца назад

PluXml CMS allows a user's session identifier to be set before authentication. The value of this session ID stays the same after authentication. This behaviour enables an attacker to fix a session ID for a victim and later hijack the authenticated session. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only versions 5.8.21 and 5.9.0-rc7 were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

CVSS3: 9.8
debian
около 1 месяца назад

PluXml CMS allows a user's session identifier to be set before authent ...

EPSS

Процентиль: 18%
0.00059
Низкий

4.8 Medium

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-384