Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2021-25966
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Orchard Core CMS - Improper Session Termination after Password Change
Source: NVD (National Vulnerability Database)
Vulnerability Description
In “Orchard core CMS” application, versions 1.0.0-beta1-3383 to 1.0.0 are vulnerable to an improper session termination after password change. When a password has been changed by the user or by an administrator, a user that was already logged in, will still have access to the application even after the password was changed.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
不充分的会话过期机制
Source: NVD (National Vulnerability Database)
Vulnerability Title
OrchardCMS 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OrchardCMS是使用 ASP.NET Core 构建的开源模块化和多租户应用程序框架,以及构建在该框架之上的内容管理系统 (CMS)。 OrchardCMS 存在代码问题漏洞,该漏洞源于在“Orchard core CMS”应用程序中,版本 1.0.0-beta1-3383 到 1.0.0 容易在密码更改后会话不正确终止。当用户或管理员更改密码时,即使在更改密码后,已经登录的用户仍然可以访问应用程序。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
OrchardCoreUsers 1.0.0-beta1-3383 ~ unspecified -
II. Public POCs for CVE-2021-25966
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium
Qwen3.6-35B-A3B · 7618 chars
Paid plan includes:
In-depth vulnerability mechanism
Trigger conditions & impact
Full executable POC code
Exploit chain & mitigation
POC zip download
100+ AI POC generations per month
III. Intelligence Information for CVE-2021-25966
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2021-25966

No comments yet


Leave a comment