An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTdnZ3ctaDhwcC1yOTVy

October CMS Session ID not invalidated after logout


When logging out, the session ID was not invalidated. This is not a problem while the user is logged out, but as soon as the user logs back in the old session ID would be valid again; which means that anyone that gained access to the old session cookie would be able to act as the logged in user. This is not a major concern for the majority of cases, since it requires a malicious party gaining access to the session cookie in the first place, but nevertheless has been fixed.


Issue has been patched in Build 472 (v1.0.472) and v1.1.2.


Apply to your installation manually if unable to upgrade to Build 472 or v1.1.2.


For more information

If you have any questions or comments about this advisory:

Threat assessment:

Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: over 2 years ago
Updated: 15 days ago

CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-7ggw-h8pp-r95r, CVE-2021-3311

Affected Packages

Versions: >= 1.1.0, < 1.1.2, < 1.0.472
Fixed in: 1.1.2, 1.0.472