Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2026-24352

Опубликовано: 27 фев. 2026
Источник: nvd
CVSS3: 9.8
EPSS Низкий

Описание

PluXml CMS allows a user's session identifier to be set before authentication. The value of this session ID stays the same after authentication. This behaviour enables an attacker to fix a session ID for a victim and later hijack the authenticated session.

The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only versions 5.8.21 and 5.9.0-rc7 were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:pluxml:pluxml:5.8.9:rc7:*:*:*:*:*:*
cpe:2.3:a:pluxml:pluxml:5.8.21:*:*:*:*:*:*:*

EPSS

Процентиль: 18%
0.00059
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-384

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 1 месяца назад

PluXml CMS allows a user's session identifier to be set before authentication. The value of this session ID stays the same after authentication. This behaviour enables an attacker to fix a session ID for a victim and later hijack the authenticated session. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only versions 5.8.21 and 5.9.0-rc7 were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

CVSS3: 9.8
debian
около 1 месяца назад

PluXml CMS allows a user's session identifier to be set before authent ...

CVSS3: 9.8
github
около 1 месяца назад

PluXml CMS allows a user's session identifier to be set before authentication. The value of this session ID stays the same after authentication. This behaviour enables an attacker to fix a session ID for a victim and later hijack the authenticated session. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only versions 5.8.21 and 5.9.0-rc7 were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

EPSS

Процентиль: 18%
0.00059
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-384