CVE-2021-25976: CWE-352 Cross-Site Request Forgery (CSRF) in PiranhaCMS Piranha
In PiranhaCMS, versions 4.0.0-alpha1 to 9.2.0 are vulnerable to cross-site request forgery (CSRF) when performing various actions supported by the management system, such as deleting a user, deleting a role, editing a post, deleting a media folder etc., when an ID is known.
AI Analysis
Technical Summary
CVE-2021-25976 is a high-severity vulnerability classified as CWE-352 (Cross-Site Request Forgery, CSRF) affecting PiranhaCMS, specifically the Piranha product versions from 4.0.0-alpha1 up to 9.2.0. This vulnerability allows an attacker to perform unauthorized state-changing actions on the management system of PiranhaCMS by exploiting the lack of proper CSRF protections. Actions vulnerable to exploitation include critical administrative operations such as deleting users, deleting roles, editing posts, and deleting media folders, provided the attacker knows the relevant resource IDs. The vulnerability does not require any authentication or privileges, but it does require user interaction in the form of the victim visiting a maliciously crafted webpage or clicking a link. The CVSS v3.1 base score is 8.1, indicating a high impact with network attack vector, low attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality impact, but high integrity and availability impacts. The vulnerability was publicly disclosed on November 16, 2021, and no known exploits have been reported in the wild to date. The absence of patches linked in the provided data suggests that mitigation may require manual configuration or updates from the vendor. The vulnerability arises because the PiranhaCMS management interface does not implement anti-CSRF tokens or other effective CSRF mitigations, allowing attackers to trick authenticated users into submitting unintended requests that alter system state or content.
Potential Impact
For European organizations using PiranhaCMS, this vulnerability poses a significant risk to the integrity and availability of their content management systems. Successful exploitation could lead to unauthorized deletion or modification of users, roles, posts, and media assets, potentially disrupting business operations, damaging reputations, and causing data loss. Since PiranhaCMS is used for managing websites and digital content, attacks could result in defacement, loss of critical content, or unauthorized privilege escalation if user roles are manipulated. The lack of confidentiality impact reduces the risk of data leakage, but the high integrity and availability impact can severely affect service continuity. Given that the vulnerability requires user interaction but no authentication, phishing or social engineering campaigns could be effective attack vectors. European organizations in sectors relying heavily on web presence and content management, such as media, education, government, and SMEs, are particularly at risk. The absence of known exploits in the wild reduces immediate threat but does not eliminate the risk, especially if attackers develop exploit kits or automated tools.
Mitigation Recommendations
To mitigate CVE-2021-25976, European organizations should: 1) Immediately upgrade PiranhaCMS to the latest version where this vulnerability is patched; if no patch is available, consider applying vendor-recommended workarounds or disabling vulnerable management functionalities temporarily. 2) Implement strict anti-CSRF protections by ensuring that all state-changing requests require a valid CSRF token, which should be verified server-side. 3) Enforce strong authentication and session management controls to reduce the risk of session hijacking or misuse. 4) Educate users and administrators about phishing and social engineering risks to minimize user interaction with malicious content. 5) Monitor web server and application logs for unusual or unauthorized management actions, especially deletions or edits of critical resources. 6) Employ Content Security Policy (CSP) headers and SameSite cookies to reduce CSRF attack surface. 7) Restrict access to the management interface via network controls such as IP whitelisting or VPN access to limit exposure. 8) Conduct regular security assessments and penetration testing focused on web application vulnerabilities including CSRF. These steps go beyond generic advice by focusing on both immediate patching and layered defenses tailored to the nature of this vulnerability and the operational context of PiranhaCMS deployments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2021-25976: CWE-352 Cross-Site Request Forgery (CSRF) in PiranhaCMS Piranha
Description
In PiranhaCMS, versions 4.0.0-alpha1 to 9.2.0 are vulnerable to cross-site request forgery (CSRF) when performing various actions supported by the management system, such as deleting a user, deleting a role, editing a post, deleting a media folder etc., when an ID is known.
AI-Powered Analysis
Technical Analysis
CVE-2021-25976 is a high-severity vulnerability classified as CWE-352 (Cross-Site Request Forgery, CSRF) affecting PiranhaCMS, specifically the Piranha product versions from 4.0.0-alpha1 up to 9.2.0. This vulnerability allows an attacker to perform unauthorized state-changing actions on the management system of PiranhaCMS by exploiting the lack of proper CSRF protections. Actions vulnerable to exploitation include critical administrative operations such as deleting users, deleting roles, editing posts, and deleting media folders, provided the attacker knows the relevant resource IDs. The vulnerability does not require any authentication or privileges, but it does require user interaction in the form of the victim visiting a maliciously crafted webpage or clicking a link. The CVSS v3.1 base score is 8.1, indicating a high impact with network attack vector, low attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality impact, but high integrity and availability impacts. The vulnerability was publicly disclosed on November 16, 2021, and no known exploits have been reported in the wild to date. The absence of patches linked in the provided data suggests that mitigation may require manual configuration or updates from the vendor. The vulnerability arises because the PiranhaCMS management interface does not implement anti-CSRF tokens or other effective CSRF mitigations, allowing attackers to trick authenticated users into submitting unintended requests that alter system state or content.
Potential Impact
For European organizations using PiranhaCMS, this vulnerability poses a significant risk to the integrity and availability of their content management systems. Successful exploitation could lead to unauthorized deletion or modification of users, roles, posts, and media assets, potentially disrupting business operations, damaging reputations, and causing data loss. Since PiranhaCMS is used for managing websites and digital content, attacks could result in defacement, loss of critical content, or unauthorized privilege escalation if user roles are manipulated. The lack of confidentiality impact reduces the risk of data leakage, but the high integrity and availability impact can severely affect service continuity. Given that the vulnerability requires user interaction but no authentication, phishing or social engineering campaigns could be effective attack vectors. European organizations in sectors relying heavily on web presence and content management, such as media, education, government, and SMEs, are particularly at risk. The absence of known exploits in the wild reduces immediate threat but does not eliminate the risk, especially if attackers develop exploit kits or automated tools.
Mitigation Recommendations
To mitigate CVE-2021-25976, European organizations should: 1) Immediately upgrade PiranhaCMS to the latest version where this vulnerability is patched; if no patch is available, consider applying vendor-recommended workarounds or disabling vulnerable management functionalities temporarily. 2) Implement strict anti-CSRF protections by ensuring that all state-changing requests require a valid CSRF token, which should be verified server-side. 3) Enforce strong authentication and session management controls to reduce the risk of session hijacking or misuse. 4) Educate users and administrators about phishing and social engineering risks to minimize user interaction with malicious content. 5) Monitor web server and application logs for unusual or unauthorized management actions, especially deletions or edits of critical resources. 6) Employ Content Security Policy (CSP) headers and SameSite cookies to reduce CSRF attack surface. 7) Restrict access to the management interface via network controls such as IP whitelisting or VPN access to limit exposure. 8) Conduct regular security assessments and penetration testing focused on web application vulnerabilities including CSRF. These steps go beyond generic advice by focusing on both immediate patching and layered defenses tailored to the nature of this vulnerability and the operational context of PiranhaCMS deployments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Mend
- Date Reserved
- 2021-01-22T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983bc4522896dcbedcd5
Added to database: 5/21/2025, 9:09:15 AM
Last enriched: 6/25/2025, 9:16:08 AM
Last updated: 7/31/2025, 1:37:45 AM
Views: 11
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.