Skip to main content

CVE-2021-25976: CWE-352 Cross-Site Request Forgery (CSRF) in PiranhaCMS Piranha

High
VulnerabilityCVE-2021-25976cvecve-2021-25976cwe-352
Published: Tue Nov 16 2021 (11/16/2021, 09:05:12 UTC)
Source: CVE
Vendor/Project: PiranhaCMS
Product: Piranha

Description

In PiranhaCMS, versions 4.0.0-alpha1 to 9.2.0 are vulnerable to cross-site request forgery (CSRF) when performing various actions supported by the management system, such as deleting a user, deleting a role, editing a post, deleting a media folder etc., when an ID is known.

AI-Powered Analysis

AILast updated: 06/25/2025, 09:16:08 UTC

Technical Analysis

CVE-2021-25976 is a high-severity vulnerability classified as CWE-352 (Cross-Site Request Forgery, CSRF) affecting PiranhaCMS, specifically the Piranha product versions from 4.0.0-alpha1 up to 9.2.0. This vulnerability allows an attacker to perform unauthorized state-changing actions on the management system of PiranhaCMS by exploiting the lack of proper CSRF protections. Actions vulnerable to exploitation include critical administrative operations such as deleting users, deleting roles, editing posts, and deleting media folders, provided the attacker knows the relevant resource IDs. The vulnerability does not require any authentication or privileges, but it does require user interaction in the form of the victim visiting a maliciously crafted webpage or clicking a link. The CVSS v3.1 base score is 8.1, indicating a high impact with network attack vector, low attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality impact, but high integrity and availability impacts. The vulnerability was publicly disclosed on November 16, 2021, and no known exploits have been reported in the wild to date. The absence of patches linked in the provided data suggests that mitigation may require manual configuration or updates from the vendor. The vulnerability arises because the PiranhaCMS management interface does not implement anti-CSRF tokens or other effective CSRF mitigations, allowing attackers to trick authenticated users into submitting unintended requests that alter system state or content.

Potential Impact

For European organizations using PiranhaCMS, this vulnerability poses a significant risk to the integrity and availability of their content management systems. Successful exploitation could lead to unauthorized deletion or modification of users, roles, posts, and media assets, potentially disrupting business operations, damaging reputations, and causing data loss. Since PiranhaCMS is used for managing websites and digital content, attacks could result in defacement, loss of critical content, or unauthorized privilege escalation if user roles are manipulated. The lack of confidentiality impact reduces the risk of data leakage, but the high integrity and availability impact can severely affect service continuity. Given that the vulnerability requires user interaction but no authentication, phishing or social engineering campaigns could be effective attack vectors. European organizations in sectors relying heavily on web presence and content management, such as media, education, government, and SMEs, are particularly at risk. The absence of known exploits in the wild reduces immediate threat but does not eliminate the risk, especially if attackers develop exploit kits or automated tools.

Mitigation Recommendations

To mitigate CVE-2021-25976, European organizations should: 1) Immediately upgrade PiranhaCMS to the latest version where this vulnerability is patched; if no patch is available, consider applying vendor-recommended workarounds or disabling vulnerable management functionalities temporarily. 2) Implement strict anti-CSRF protections by ensuring that all state-changing requests require a valid CSRF token, which should be verified server-side. 3) Enforce strong authentication and session management controls to reduce the risk of session hijacking or misuse. 4) Educate users and administrators about phishing and social engineering risks to minimize user interaction with malicious content. 5) Monitor web server and application logs for unusual or unauthorized management actions, especially deletions or edits of critical resources. 6) Employ Content Security Policy (CSP) headers and SameSite cookies to reduce CSRF attack surface. 7) Restrict access to the management interface via network controls such as IP whitelisting or VPN access to limit exposure. 8) Conduct regular security assessments and penetration testing focused on web application vulnerabilities including CSRF. These steps go beyond generic advice by focusing on both immediate patching and layered defenses tailored to the nature of this vulnerability and the operational context of PiranhaCMS deployments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Mend
Date Reserved
2021-01-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbedcd5

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 6/25/2025, 9:16:08 AM

Last updated: 7/31/2025, 1:37:45 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats